1. National Institute of Standards and Technology (NIST). (2012). Guidelines for Securing Wireless Local Area Networks (WLANs) (NIST Special Publication 800-153). Section 4.2.1
"MAC Address Filtering
" states
"However
because MAC addresses are sent in the clear
an attacker can easily spoof the MAC address of an authorized client."
2. Kurose
J. F.
& Ross
K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. In Chapter 8.3
"Securing Wireless LANs
" the text explains that MAC filtering is a weak security measure because "the intruder can learn the MAC addresses of stations that are associated with the AP... and then have his or her station pretend to be one of these stations by spoofing its MAC address."
3. Stallings
W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. Chapter 17
"Wireless Network Security
" discusses the security flaws of early Wi-Fi standards
noting that MAC address filtering is easily defeated by sniffing a valid MAC address and then spoofing it.