I. Introduction
WiFi is the dominant infrastructure for last-mile internet access in indoor and outdoor environments. WiFi network is not only used as a Wireless Local Area Network (WLAN) to connect devices in the home and office; it is also used for connecting two devices using WiFi Direct (WFD) [[1]] and providing internet to peer devices with the help of 4G or 5G enabled hotspot. Mobile hotspot usage increased tremendously with the new normal of working and learning from anywhere. When a user is out of the home or office and needs the internet, the hotspot feature in the mobile shares the internet with other devices. Mobile Hotspots are very useful while waiting at the airport, staying at a hotel, and working from remote locations. The concept of WiFi on Wheels [2] to provide internet via WiFi Hotspots is also getting popular due to Work From Home (WFH) and Learn From Home (LFH). 5G Hotspot devices are becoming popular [3] to fulfill the demand. Most of the time, the WiFi network created by these hotspots serves few clients. However, it is visible to all the devices in the surrounding area, which triggers a way for intruders to attack the WiFi network. Several useful pieces of information about the network are broadcasted from the beacon, probe request/response, and association request/response frames, which intruders use to design attacks on the network. This information helps to identify the weakest link in the WiFi network for exploitation. Several hacking tools such as aircrack-ng and Wifite, are designed for WiFi network exploitation. Almost all of these tools perform network discovery as the first and foremost step for hacking the network. A feature like “Hidden Network” available in most APs does not truly hide the network from the hacking tools. Hence, there is a need for a Closed WiFi Hotspot that will prevent the WiFi networks from eavesdropping and further exploitation.