Academic literature on the topic 'Wi-Fi attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wi-Fi attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wi-Fi attacks"
Dagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Full textReyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza, and Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames." Scientia et Technica 25, no. 3 (September 30, 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.
Full textKohlios, Christopher, and Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3." Electronics 7, no. 11 (October 30, 2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Full text., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid, and Afia Zafar. "A SECURITY REVIEW OVER WI-FI AND LI-FI." Information Management and Computer Science 3, no. 1 (April 6, 2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.
Full textChen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (February 15, 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Full textXin, Liangxiao, David Starobinski, and Guevara Noubir. "Cascading Attacks on Wi-Fi Networks: Theory and Experiments." IEEE Transactions on Control of Network Systems 7, no. 4 (December 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.
Full textA. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz, and Vijay Devabhaktuni. "A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System." Electronics 9, no. 10 (October 15, 2020): 1689. http://dx.doi.org/10.3390/electronics9101689.
Full textPark, Min-Woo, Young-Hyun Choi, Jung-Ho Eom, and Tai-Myoung Chung. "Dangerous Wi-Fi access point: attacks to benign smartphone applications." Personal and Ubiquitous Computing 18, no. 6 (October 29, 2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.
Full textXin, Liangxiao, and David Starobinski. "Countering Cascading Denial of Service Attacks on Wi-Fi Networks." IEEE/ACM Transactions on Networking 29, no. 3 (June 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.
Full textSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Full textDissertations / Theses on the topic "Wi-Fi attacks"
Matte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.
Full textThe recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized
Wang, Le. "Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Full textStehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.
Full textEndrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Full textDvorský, Radovan. "Detekce útoků na WiFi sítě pomocí získávaní znalostí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236114.
Full textForsman, Erik, and Andreas Skoglund. "Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20406.
Full textWi-Fi protected setup (WPS), a protocol used to configure wireless clients, isflawed in regard to the design of the authentication procedure for the PIN-code used to connect a new device. This flaw can be exploited by an attackerto perform a brute force attack to identify the code. This report presentsmethods to counteract brute force attacks performed against the WPS-protocol. The study has been performed by practical experiments where thecountermeasures have been evaluated and their performance has beenmeasured. With simple means, such as a third party acting on the routersbehalf in implementing countermeasures against the attacker, the attack canbe counteracted. The conclusion is that the most effective way of countering the WPS-bruteforce attack presented is to automatically replace the PIN-code with arandomly generated one when an attack is detected.
Dondyk, Erich. "Denial of convenience attack to smartphones using a fake wi-fi access point." Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/544.
Full textB.S.P.E.
Bachelors
Engineering and Computer Science
Computer Engineering
Horne, Liliana R. "Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1064.
Full textXin, Liangxiao. "Cascading attacks in Wi-Fi networks: demonstration and counter-measures." Thesis, 2018. https://hdl.handle.net/2144/32678.
Full textHsu, An-Ti, and 許安迪. "The Research on Wi-Fi Positioning Spoofing Attacks and Authentication Protocols." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/s65ahr.
Full text樹德科技大學
資訊工程系碩士班
104
Mobile phone technology is developing rapidly and it has many features to meet different needs. However, in the early stage no consideration to security mechanisms become obvious vulnerability. Wi-Fi positioning produced a problem. Wi-Fi positioning is based on the Media Access Control Address (MAC address) of the Access Point (AP), which can reduce positioning times and improve accuracy. However, the mobile phone apps can easily retrieve the MAC address of the AP and on the internet can also easily search public Wi-Fi AP''s MAC address map. it will be easier to collect by attacker, and Wi-Fi positioning is no authentication protocol to make spoofing attacks easily successful and easily forged real location. In this paper, we propose a combination of cryptographic systems and additional DD-WRT firmware AP, and named Authentication Protocol of Prevent Wi-Fi Positioning Spoofing Attacks. Since the MAC address with the authentication process, the server will be able to authentication the data that an attacker cannot use the collected MAC address to spoofing attacks. In this paper, we propose a Authentication protocol, it is combination of cryptographic systems and Wi-Fi AP equipped with DD-WRT firmware, Authentication protocol to Prevent Wi-Fi positioning spoofing attack, The Authentication protocol have three phase: 1. Registration Phase, 2. Examination Phase, 3. Positioning Authentication Phase, In Registration Phase, Mainly to be able to make Wi-Fi AP to Wi-Fi positioning system server to register their identity, Wi-Fi AP to generate a key, and the key to the Wi-Fi Positioning System server storage, the formation of symmetric key encryption method in the next authentication protocol requires authentication identity, Wi-Fi AP can use the key Response Wi-Fi positioning system server Challenge; In Examination Phase, because Wi-Fi AP did not pass examination, it is not using on the Wi-Fi positioning services. Pass Examination phase method is the use of counting, allowing users to agree to Wi-Fi positioning system server authority to collect information, The information collected is anonymous, Each a collection of information, the count will increase, When the count number reaches the threshold, Wi-Fi AP will pass Examination phase, The Wi-Fi AP information can be used for Wi-Fi positioning system server database, it can be used in Wi-Fi positioning services, In Positioning Authentication Phase, Mainly in the Wi-Fi Positioning, Wi-Fi positioning system server can authenticate the identity of the Wi-Fi AP, When the Wi-Fi AP can be authenticated identity, prevent spoofing attacks will become simple, The forged Wi-Fi AP or MAC address spoofing attacks will become difficult; Because Wi-Fi AP has a key, identity and MAC address can be authenticated, Wi-Fi positioning system server can be certified Wi-Fi AP or MAC address authenticity, Make forged Wi-Fi AP cannot using collected "MAC address" to spoofing attacks. However, when the Wi-Fi AP are moved (e.g. Kaohsiung to Taipei), Authentication protocol will have the possibility of authentication error. Thus, the authentication protocol will be improved. In improved authentication protocol, we let the user’s application provide more information. To confirm Wi-Fi AP exact location, authentication protocol will become more complete.
Books on the topic "Wi-Fi attacks"
Mastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Find full textBook chapters on the topic "Wi-Fi attacks"
Noubir, Guevara, and Triet D. Vo-Huu. "DoS Attacks in Wi-Fi Networks." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1445-1.
Full textLee, Il-Gu, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, and Myungchul Kim. "Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks." In Research in Attacks, Intrusions and Defenses, 362–83. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_18.
Full textVondráček, Martin, Jan Pluskal, and Ondřej Ryšavý. "Automation of MitM Attack on Wi-Fi Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 207–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73697-6_16.
Full textSong, Jin-Young, and Dea-Woo Park. "A Study on Wi-Fi Hacking Attack Using Web." In Convergence and Hybrid Information Technology, 464–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24082-9_57.
Full textSharma, Kavita, and B. B. Gupta. "Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges." In Advances in Intelligent Systems and Computing, 555–61. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_56.
Full text"Wireless Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 244–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.
Full textSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." In Research Anthology on Combating Denial-of-Service Attacks, 415–34. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch022.
Full textKumar, Vinoth, V. R. Niveditha, V. Muthukumaran, S. Satheesh Kumar, Samyukta D. Kumta, and Murugesan R. "A Quantum Technology-Based LiFi Security Using Quantum Key Distribution." In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies, 104–16. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch007.
Full textMugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." In Cyber Warfare and Terrorism, 931–63. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch056.
Full textThiyagarajan, Kirubadevi, Ramamoorthy S, Neelavathy Pari S, and Rajakumar P S. "Device Authentication and Secure Routing in MANET for Internet of Things." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200159.
Full textConference papers on the topic "Wi-Fi attacks"
"SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki." In International Conference on Wireless Information Networks and Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0002027900960101.
Full textVanhoef, Mathy, and Frank Piessens. "Advanced Wi-Fi attacks using commodity hardware." In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664260.
Full textAmoordon, Andy, Christophe Gransart, and Virginie Deniau. "Characterizing Wi-Fi Man-In-the-Middle Attacks." In 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS). IEEE, 2020. http://dx.doi.org/10.23919/ursigass49373.2020.9232270.
Full textKhasanova, Adelya M. "Detection of Attacks on Wi-Fi Access Points." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396420.
Full textCanh Vu, Van, and Tuan-Hao Hoang. "Detect Wi-Fi Network Attacks Using Parallel Genetic Programming." In 2018 10th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 2018. http://dx.doi.org/10.1109/kse.2018.8573378.
Full textXin, Liangxiao, David Starobinski, and Guevara Noubir. "Cascading denial of service attacks on Wi-Fi networks." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860474.
Full textXin, Liangxiao, and David Starobinski. "Cascading Attacks on Wi-Fi Networks with Weak Interferers." In MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242102.3242142.
Full textLounis, Karim, and Mohammad Zulkernine. "Exploiting Race Condition for Wi-Fi Denial of Service Attacks." In SIN 2020: 13th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433174.3433584.
Full textCominelli, Marco, Francesco Gringoli, and Renato Lo Cigno. "Non Intrusive Wi-Fi CSI Obfuscation Against Active Localization Attacks." In 2021 16th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS). IEEE, 2021. http://dx.doi.org/10.23919/wons51326.2021.9415586.
Full textVanhoef, Mathy, and Frank Piessens. "Denial of Service Attacks Against the 4-Way Wi-Fi Handshake." In 9th International Conference on Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71508.
Full text