Every device has a unique MAC address.

You can allow only approved devices to connect.

Steps:

Note: Advanced attackers can spoof MACs, so this is extra protection — not primary.