Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Wi-Fi attacks“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Wi-Fi attacks" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Wi-Fi attacks"
Dagelić, Ante, Toni Perković, Bojan Vujatović und Mario Čagalj. „SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists“. Wireless Communications and Mobile Computing 2018 (22.07.2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Der volle Inhalt der QuelleReyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza und Andrea Lorena Ochoa-Murillo. „Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames“. Scientia et Technica 25, Nr. 3 (30.09.2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.
Der volle Inhalt der QuelleKohlios, Christopher, und Thaier Hayajneh. „A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3“. Electronics 7, Nr. 11 (30.10.2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Der volle Inhalt der Quelle., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid und Afia Zafar. „A SECURITY REVIEW OVER WI-FI AND LI-FI“. Information Management and Computer Science 3, Nr. 1 (06.04.2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.
Der volle Inhalt der QuelleChen, Yongle, Xiaojian Wang, Yuli Yang und Hong Li. „Location-Aware Wi-Fi Authentication Scheme Using Smart Contract“. Sensors 20, Nr. 4 (15.02.2020): 1062. http://dx.doi.org/10.3390/s20041062.
Der volle Inhalt der QuelleXin, Liangxiao, David Starobinski und Guevara Noubir. „Cascading Attacks on Wi-Fi Networks: Theory and Experiments“. IEEE Transactions on Control of Network Systems 7, Nr. 4 (Dezember 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.
Der volle Inhalt der QuelleA. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz und Vijay Devabhaktuni. „A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System“. Electronics 9, Nr. 10 (15.10.2020): 1689. http://dx.doi.org/10.3390/electronics9101689.
Der volle Inhalt der QuellePark, Min-Woo, Young-Hyun Choi, Jung-Ho Eom und Tai-Myoung Chung. „Dangerous Wi-Fi access point: attacks to benign smartphone applications“. Personal and Ubiquitous Computing 18, Nr. 6 (29.10.2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.
Der volle Inhalt der QuelleXin, Liangxiao, und David Starobinski. „Countering Cascading Denial of Service Attacks on Wi-Fi Networks“. IEEE/ACM Transactions on Networking 29, Nr. 3 (Juni 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.
Der volle Inhalt der QuelleSharma, Kavita, und B. B. Gupta. „Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices“. International Journal of E-Services and Mobile Applications 10, Nr. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Der volle Inhalt der QuelleDissertationen zum Thema "Wi-Fi attacks"
Matte, Célestin. „Wi-Fi tracking : Fingerprinting attacks and counter-measures“. Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.
Der volle Inhalt der QuelleThe recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized
Wang, Le. „Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques“. Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Der volle Inhalt der QuelleStehlík, Richard. „Útok na WiFi síť s využitím ESP32/8266“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.
Der volle Inhalt der QuelleEndrle, Pavel. „Zabezpečení standardu 802.11 a jeho možnosti“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Der volle Inhalt der QuelleDvorský, Radovan. „Detekce útoků na WiFi sítě pomocí získávaní znalostí“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236114.
Der volle Inhalt der QuelleForsman, Erik, und Andreas Skoglund. „Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20406.
Der volle Inhalt der QuelleWi-Fi protected setup (WPS), a protocol used to configure wireless clients, isflawed in regard to the design of the authentication procedure for the PIN-code used to connect a new device. This flaw can be exploited by an attackerto perform a brute force attack to identify the code. This report presentsmethods to counteract brute force attacks performed against the WPS-protocol. The study has been performed by practical experiments where thecountermeasures have been evaluated and their performance has beenmeasured. With simple means, such as a third party acting on the routersbehalf in implementing countermeasures against the attacker, the attack canbe counteracted. The conclusion is that the most effective way of countering the WPS-bruteforce attack presented is to automatically replace the PIN-code with arandomly generated one when an attack is detected.
Dondyk, Erich. „Denial of convenience attack to smartphones using a fake wi-fi access point“. Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/544.
Der volle Inhalt der QuelleB.S.P.E.
Bachelors
Engineering and Computer Science
Computer Engineering
Horne, Liliana R. „Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach“. Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1064.
Der volle Inhalt der QuelleXin, Liangxiao. „Cascading attacks in Wi-Fi networks: demonstration and counter-measures“. Thesis, 2018. https://hdl.handle.net/2144/32678.
Der volle Inhalt der QuelleHsu, An-Ti, und 許安迪. „The Research on Wi-Fi Positioning Spoofing Attacks and Authentication Protocols“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/s65ahr.
Der volle Inhalt der Quelle樹德科技大學
資訊工程系碩士班
104
Mobile phone technology is developing rapidly and it has many features to meet different needs. However, in the early stage no consideration to security mechanisms become obvious vulnerability. Wi-Fi positioning produced a problem. Wi-Fi positioning is based on the Media Access Control Address (MAC address) of the Access Point (AP), which can reduce positioning times and improve accuracy. However, the mobile phone apps can easily retrieve the MAC address of the AP and on the internet can also easily search public Wi-Fi AP''s MAC address map. it will be easier to collect by attacker, and Wi-Fi positioning is no authentication protocol to make spoofing attacks easily successful and easily forged real location. In this paper, we propose a combination of cryptographic systems and additional DD-WRT firmware AP, and named Authentication Protocol of Prevent Wi-Fi Positioning Spoofing Attacks. Since the MAC address with the authentication process, the server will be able to authentication the data that an attacker cannot use the collected MAC address to spoofing attacks. In this paper, we propose a Authentication protocol, it is combination of cryptographic systems and Wi-Fi AP equipped with DD-WRT firmware, Authentication protocol to Prevent Wi-Fi positioning spoofing attack, The Authentication protocol have three phase: 1. Registration Phase, 2. Examination Phase, 3. Positioning Authentication Phase, In Registration Phase, Mainly to be able to make Wi-Fi AP to Wi-Fi positioning system server to register their identity, Wi-Fi AP to generate a key, and the key to the Wi-Fi Positioning System server storage, the formation of symmetric key encryption method in the next authentication protocol requires authentication identity, Wi-Fi AP can use the key Response Wi-Fi positioning system server Challenge; In Examination Phase, because Wi-Fi AP did not pass examination, it is not using on the Wi-Fi positioning services. Pass Examination phase method is the use of counting, allowing users to agree to Wi-Fi positioning system server authority to collect information, The information collected is anonymous, Each a collection of information, the count will increase, When the count number reaches the threshold, Wi-Fi AP will pass Examination phase, The Wi-Fi AP information can be used for Wi-Fi positioning system server database, it can be used in Wi-Fi positioning services, In Positioning Authentication Phase, Mainly in the Wi-Fi Positioning, Wi-Fi positioning system server can authenticate the identity of the Wi-Fi AP, When the Wi-Fi AP can be authenticated identity, prevent spoofing attacks will become simple, The forged Wi-Fi AP or MAC address spoofing attacks will become difficult; Because Wi-Fi AP has a key, identity and MAC address can be authenticated, Wi-Fi positioning system server can be certified Wi-Fi AP or MAC address authenticity, Make forged Wi-Fi AP cannot using collected "MAC address" to spoofing attacks. However, when the Wi-Fi AP are moved (e.g. Kaohsiung to Taipei), Authentication protocol will have the possibility of authentication error. Thus, the authentication protocol will be improved. In improved authentication protocol, we let the user’s application provide more information. To confirm Wi-Fi AP exact location, authentication protocol will become more complete.
Bücher zum Thema "Wi-Fi attacks"
Mastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Wi-Fi attacks"
Noubir, Guevara, und Triet D. Vo-Huu. „DoS Attacks in Wi-Fi Networks“. In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1445-1.
Der volle Inhalt der QuelleLee, Il-Gu, Hyunwoo Choi, Yongdae Kim, Seungwon Shin und Myungchul Kim. „Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks“. In Research in Attacks, Intrusions and Defenses, 362–83. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_18.
Der volle Inhalt der QuelleVondráček, Martin, Jan Pluskal und Ondřej Ryšavý. „Automation of MitM Attack on Wi-Fi Networks“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 207–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73697-6_16.
Der volle Inhalt der QuelleSong, Jin-Young, und Dea-Woo Park. „A Study on Wi-Fi Hacking Attack Using Web“. In Convergence and Hybrid Information Technology, 464–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24082-9_57.
Der volle Inhalt der QuelleSharma, Kavita, und B. B. Gupta. „Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges“. In Advances in Intelligent Systems and Computing, 555–61. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_56.
Der volle Inhalt der Quelle„Wireless Hacking“. In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 244–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.
Der volle Inhalt der QuelleSharma, Kavita, und B. B. Gupta. „Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices“. In Research Anthology on Combating Denial-of-Service Attacks, 415–34. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch022.
Der volle Inhalt der QuelleKumar, Vinoth, V. R. Niveditha, V. Muthukumaran, S. Satheesh Kumar, Samyukta D. Kumta und Murugesan R. „A Quantum Technology-Based LiFi Security Using Quantum Key Distribution“. In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies, 104–16. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch007.
Der volle Inhalt der QuelleMugavero, Roberto, Stanislav Abaimov, Federico Benolli und Valentina Sabato. „Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)“. In Cyber Warfare and Terrorism, 931–63. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch056.
Der volle Inhalt der QuelleThiyagarajan, Kirubadevi, Ramamoorthy S, Neelavathy Pari S und Rajakumar P S. „Device Authentication and Secure Routing in MANET for Internet of Things“. In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200159.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Wi-Fi attacks"
„SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki“. In International Conference on Wireless Information Networks and Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0002027900960101.
Der volle Inhalt der QuelleVanhoef, Mathy, und Frank Piessens. „Advanced Wi-Fi attacks using commodity hardware“. In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664260.
Der volle Inhalt der QuelleAmoordon, Andy, Christophe Gransart und Virginie Deniau. „Characterizing Wi-Fi Man-In-the-Middle Attacks“. In 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS). IEEE, 2020. http://dx.doi.org/10.23919/ursigass49373.2020.9232270.
Der volle Inhalt der QuelleKhasanova, Adelya M. „Detection of Attacks on Wi-Fi Access Points“. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396420.
Der volle Inhalt der QuelleCanh Vu, Van, und Tuan-Hao Hoang. „Detect Wi-Fi Network Attacks Using Parallel Genetic Programming“. In 2018 10th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 2018. http://dx.doi.org/10.1109/kse.2018.8573378.
Der volle Inhalt der QuelleXin, Liangxiao, David Starobinski und Guevara Noubir. „Cascading denial of service attacks on Wi-Fi networks“. In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860474.
Der volle Inhalt der QuelleXin, Liangxiao, und David Starobinski. „Cascading Attacks on Wi-Fi Networks with Weak Interferers“. In MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242102.3242142.
Der volle Inhalt der QuelleLounis, Karim, und Mohammad Zulkernine. „Exploiting Race Condition for Wi-Fi Denial of Service Attacks“. In SIN 2020: 13th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433174.3433584.
Der volle Inhalt der QuelleCominelli, Marco, Francesco Gringoli und Renato Lo Cigno. „Non Intrusive Wi-Fi CSI Obfuscation Against Active Localization Attacks“. In 2021 16th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS). IEEE, 2021. http://dx.doi.org/10.23919/wons51326.2021.9415586.
Der volle Inhalt der QuelleVanhoef, Mathy, und Frank Piessens. „Denial of Service Attacks Against the 4-Way Wi-Fi Handshake“. In 9th International Conference on Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71508.
Der volle Inhalt der Quelle