Academic literature on the topic 'Wi-Fi attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wi-Fi attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wi-Fi attacks"

1

Dagelić, Ante, Toni Perković, Bojan Vujatović, and Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists." Wireless Communications and Mobile Computing 2018 (July 22, 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.

Full text
Abstract:
User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.
APA, Harvard, Vancouver, ISO, and other styles
2

Reyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza, and Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames." Scientia et Technica 25, no. 3 (September 30, 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.

Full text
Abstract:
Wi-Fi networks have become prevalent in homes, businesses, and public places. Wi-Fi is one of the most common means that people use to access digital services like Facebook, WhatsApp, Instagram, email, and even payment platforms. Equipment for deploying Wi-Fi networks is affordable and its basic features are easy to manipulate. In many cases Wi-Fi users do not even have to buy any communication equipment, since Wi-Fi routers are installed by internet service providers (ISP) in the premises of their customers. Wi-Fi equipment, owned either by end users or ISP companies, should be configured as securely as possible to avoid potential attacks. The security capabilities and features of Wi-Fi routers and access points are inserted into beacon and probe response frames. Potential attackers can use sniffing tools like Wireshark to capture these frames and extract information about security features to discover vulnerabilities. In order to assess the security risks of Wi-Fi networks we conducted a survey in which we used Wireshark to capture the traffic from several Wi-Fi networks, and then through a filter we selected the beacon and probe response frames to analyze the security information elements carried by those frames. We came to the conclusion that despite technical recommendations, some security parameters and options are still set in a way that makes networks more prone to attacks. With this paper we want the readers to be aware of the security risks of their Wi-Fi networks, even the ones set up by their internet service providers.
APA, Harvard, Vancouver, ISO, and other styles
3

Kohlios, Christopher, and Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3." Electronics 7, no. 11 (October 30, 2018): 284. http://dx.doi.org/10.3390/electronics7110284.

Full text
Abstract:
The presence of wireless communication grows undeniably more prevalent each year. Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks (WLAN) in 1997, technologies have progressed to provide wireless accessibility to industries and consumers with growing ease and convenience. As the usage of personal devices, such as phones and watches, that connect to the Internet through Wi-Fi increases, wireless attacks on users are becoming more critical. This paper provides a novel attack model to offer an organized and comprehensive view of the possible attacks on Wi-Fi latest security standards. All existing attacks will be investigated, with emphasis on more recent attacks, such as the KRACK and PMKID Dictionary attacks. The main contribution of this paper is to analyze the technology offered in the new Wi-Fi Protected Access III (WPA3) security scheme and provide the first comprehensive security analysis and discussion to determine whether it has addressed the vulnerabilities of its predecessor. An interesting finding of this paper is that WPA3 still lacks in addressing all the issues existing in WPA2 and exploring other mitigations for future research.
APA, Harvard, Vancouver, ISO, and other styles
4

., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid, and Afia Zafar. "A SECURITY REVIEW OVER WI-FI AND LI-FI." Information Management and Computer Science 3, no. 1 (April 6, 2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.

Full text
Abstract:
Wi-Fi and Li-Fi are two modern era technologies that are used for data communication. Wi-Fi stands for Wireless Fidelity and Li-Fi stands for Light Fidelity. Wi-Fi uses radio frequency (RF) waves to for transmission of data, on the other hand Li-Fi uses light signals or visible light for data communication. Li-Fi provides transmission of data through illumination by sending data through an LED light bulb. Wi-Fi and Li-Fi technology is used in the various applications of daily life. Both the technologies differ in their properties, architecture, and working. Li-Fi is based on the IEEE 802.11ad standard and uses VLC for data communication while Wi-Fi uses the IEEE standard 802.11 on different devices like routers to transmit data. The objective of this research work is to highlight security prospective of these both technologies; various attacks which can occur and their counter measure as well as misconceptions related to both Wi-Fi vs. Li-Fi is presented in this research paper. Wi-Fi is widely implemented in many major and minor fields of life and the capacity it is providing is accessed. Li-fi, on the end hand, is a means of an opportunity to further develop the efficiency and use of data and to provide resources that are required for the future needs.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yongle, Xiaojian Wang, Yuli Yang, and Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract." Sensors 20, no. 4 (February 15, 2020): 1062. http://dx.doi.org/10.3390/s20041062.

Full text
Abstract:
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. We use the smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
6

Xin, Liangxiao, David Starobinski, and Guevara Noubir. "Cascading Attacks on Wi-Fi Networks: Theory and Experiments." IEEE Transactions on Control of Network Systems 7, no. 4 (December 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

A. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz, and Vijay Devabhaktuni. "A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System." Electronics 9, no. 10 (October 15, 2020): 1689. http://dx.doi.org/10.3390/electronics9101689.

Full text
Abstract:
The growth of wireless networks has been remarkable in the last few years. One of the main reasons for this growth is the massive use of portable and stand-alone devices with wireless network connectivity. These devices have become essential on the daily basis in consumer electronics. As the dependency on wireless networks has increased, the attacks against them over time have increased as well. To detect these attacks, a network intrusion detection system (NIDS) with high accuracy and low detection time is needed. In this work, we propose a machine learning (ML) based wireless network intrusion detection system (WNIDS) for Wi-Fi networks to efficiently detect attacks against them. The proposed WNIDS consists of two stages that work together in a sequence. An ML model is developed for each stage to classify the network records into normal or one of the specific attack classes. We train and validate the ML model for WNIDS using the publicly available Aegean Wi-Fi Intrusion Dataset (AWID). Several feature selection techniques have been considered to identify the best features set for the WNIDS. Our two-stage WNIDS achieves an accuracy of 99.42% for multi-class classification with a reduced set of features. A module for eXplainable Artificial Intelligence (XAI) is implemented as well to understand the influence of features on each type of network traffic records.
APA, Harvard, Vancouver, ISO, and other styles
8

Park, Min-Woo, Young-Hyun Choi, Jung-Ho Eom, and Tai-Myoung Chung. "Dangerous Wi-Fi access point: attacks to benign smartphone applications." Personal and Ubiquitous Computing 18, no. 6 (October 29, 2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xin, Liangxiao, and David Starobinski. "Countering Cascading Denial of Service Attacks on Wi-Fi Networks." IEEE/ACM Transactions on Networking 29, no. 3 (June 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.

Full text
Abstract:
This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of Denial of Service (DoS) attacks in a distributed environment that eliminates the availability of resources or data on a computer network. DDoS attack exhausts the network resources and disturbs the legitimate user. This article provides an explanation on DDoS attacks and nature of these attacks against Smartphones and Wi-Fi Technology and presents a taxonomy of various defense mechanisms. The smartphone is chosen for this study, as they have now become a necessity rather than a luxury item for the common people.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wi-Fi attacks"

1

Matte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.

Full text
Abstract:
Le récent développement des appareils portatifs possédant une interface Wi-Fi (smartphones, tablettes et « wearables ») s'accompagne d'une menace sur la vie privée de leurs utilisateurs, et sur la société toute entière. Ces appareils émettent en continu des signaux pouvant être capturés par un attaquant passif, à l'aide de matériel peu coûteux et de connaissances basiques. Ces signaux contiennent un identifiant unique appelé l'adresse MAC. Pour faire face à cette menace, les acteurs du secteur déploient actuellement une contre-mesure sur les appareils récents: le changement aléatoire de l'adresse MAC. Malheureusement, nous montrons que cette mesure, dans son état actuel, n'est pas suffisante pour empêcher le traçage des appareils. Pour cela, nous introduisons plusieurs attaques basées sur le contenu et la répartition temporelle des signaux. En complément, nous étudions les implémentations du changement aléatoire de l'adresse MAC sur des appareils récents, et trouvons un certain nombre de manquements limitant l'efficacité de ces implémentations à prévenir le traçage. En parallèle, nous effectuons deux études de terrain. La première s'attaque au développement des acteurs exploitant les problèmes cités plus haut afin d'installer des systèmes de traçage basés sur le Wi-Fi. Nous listons certaines de ces installations et examinons plusieurs aspects de ces systèmes : leur régulation, les implications en terme de vie privée, les questions de consentement et leur acceptation par le public. La seconde étude concerne la progression du changement aléatoire d'adresse MAC dans la population des appareils. Finalement, nous présentons deux outils : le premier est un système de traçage expérimental développé pour effectuer des tests et sensibiliser le public aux problèmes de vie privée liés à de tels systèmes. Le second estime l'unicité d'un appareil en se basant sur le contenu des signaux qu'il émet, même si leur identifiant est modifié
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Le. "Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.

Full text
Abstract:
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. "
APA, Harvard, Vancouver, ISO, and other styles
3

Stehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.

Full text
Abstract:
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
APA, Harvard, Vancouver, ISO, and other styles
4

Endrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.

Full text
Abstract:
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
APA, Harvard, Vancouver, ISO, and other styles
5

Dvorský, Radovan. "Detekce útoků na WiFi sítě pomocí získávaní znalostí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236114.

Full text
Abstract:
Widespread use of wireless networks has made security a serious issue. This thesis proposes misuse based intrusion detection system for wireless networks, which applies artificial neural network to captured frames for purpose of anomalous patterns recognition. To address the problem of high positive alarm rate, this thesis presents a method of applying two artificial neural networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Forsman, Erik, and Andreas Skoglund. "Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20406.

Full text
Abstract:
Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats. Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks.
Wi-Fi protected setup (WPS), a protocol used to configure wireless clients, isflawed in regard to the design of the authentication procedure for the PIN-code used to connect a new device. This flaw can be exploited by an attackerto perform a brute force attack to identify the code. This report presentsmethods to counteract brute force attacks performed against the WPS-protocol. The study has been performed by practical experiments where thecountermeasures have been evaluated and their performance has beenmeasured. With simple means, such as a third party acting on the routersbehalf in implementing countermeasures against the attacker, the attack canbe counteracted. The conclusion is that the most effective way of countering the WPS-bruteforce attack presented is to automatically replace the PIN-code with arandomly generated one when an attack is detected.
APA, Harvard, Vancouver, ISO, and other styles
7

Dondyk, Erich. "Denial of convenience attack to smartphones using a fake wi-fi access point." Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/544.

Full text
Abstract:
In this thesis, we consider a novel denial of service attack targeted at popular smartphone operating systems. This type of attack, which we call a Denial of Convenience (DoC) attack, prevents non-technical savvy victims from utilizing data services by exploiting the connectivity management protocol of smartphones' operating systems when encountered with a Wi-Fi access point. By setting up a fake Wi-Fi access point without Internet access (using simple devices such as a laptop), an adversary can prompt a smartphone with enabled Wi-Fi features to automatically terminate a valid mobile broadband connection and connect to this fake Wi-Fi access point. This, as a result, prevents the targeted smartphone from having any type of Internet connection unless the victim is capable of diagnosing the problem and disabling the Wi-Fi features manually. For the majority of smartphone users that have little networking knowledge, this can be a challenging task. We demonstrate that most current smartphones, including iPhone and Android phones, are vulnerable to this DoC attack. To address this attack, we propose implementing a novel Internet-access validation protocol to validate a Wi-Fi access point by taking advantage of the cellular network channel. It first uses the cellular network to send a secret to an Internet validation server, and tries to retrieve this secret via the newly established Wi-Fi channel to validate the connection of the Wi-Fi channel.
B.S.P.E.
Bachelors
Engineering and Computer Science
Computer Engineering
APA, Harvard, Vancouver, ISO, and other styles
8

Horne, Liliana R. "Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1064.

Full text
Abstract:
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet access and providers draw new prospective customers. While users are able to enjoy the ease of Wi-Fi Internet hotspot networks in public more conveniently, they are more susceptible to a particular type of fraud and identify theft, referred to as evil twin attack (ETA). Through setting up an ETA, an attacker can intercept sensitive data such as passwords or credit card information by snooping into the communication links. Since the objective of free open (unencrypted) public Wi-Fi hotspots is to provide ease of accessibility and to entice customers, no security mechanisms are in place. The public’s lack of awareness of the security threat posed by free open public Wi-Fi hotspots makes this problem even more heinous. Client-side systems to help wireless users detect and protect themselves from evil twin attacks in public Wi-Fi hotspots are in great need. In this dissertation report, the author explored the problem of the need for client-side detection systems that will allow wireless users to help protect their data from evil twin attacks while using free open public Wi-Fi. The client-side evil twin attack detection system constructed as part of this dissertation linked the gap between the need for wireless security in free open public Wi-Fi hotspots and limitations in existing client-side evil twin attack detection solutions. Based on design science research (DSR) literature, Hevner’s seven guidelines of DSR, Peffer’s design science research methodology (DSRM), Gregor’s IS design theory, and Hossen & Wenyuan’s (2014) study evaluation methodology, the author developed design principles, procedures and specifications to guide the construction, implementation, and evaluation of a prototype client-side evil twin attack detection artifact. The client-side evil twin attack detection system was evaluated in a hotel public Wi-Fi environment. The goal of this research was to develop a more effective, efficient, and practical client-side detection system for wireless users to independently detect and protect themselves from mobile evil twin attacks while using free open public Wi-Fi hotspots. The experimental results showed that client-side evil twin attack detection system can effectively detect and protect users from mobile evil twin AP attacks in public Wi-Fi hotspots in various real-world scenarios despite time delay caused by many factors.
APA, Harvard, Vancouver, ISO, and other styles
9

Xin, Liangxiao. "Cascading attacks in Wi-Fi networks: demonstration and counter-measures." Thesis, 2018. https://hdl.handle.net/2144/32678.

Full text
Abstract:
Wi-Fi (IEEE 802.11) is currently one of the primary media to access the Internet. Guaranteeing the availability of Wi-Fi networks is essential to numerous online activities, such as e-commerce, video streaming, and IoT services. Attacks on availability are generally referred to as Denial-of-Service (DoS) attacks. While there exists signif- icant literature on DoS attacks against Wi-Fi networks, most of the existing attacks are localized in nature, i.e., the attacker must be in the vicinity of the victim. The purpose of this dissertation is to investigate the feasibility of mounting global DoS attacks on Wi-Fi networks and develop effective counter-measures. First, the dissertation unveils the existence of a vulnerability at the MAC layer of Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. The dissertation demonstrates the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis. The simulations show the attack is effective both in networks operating under fixed and varying bit rates, as well as ad hoc and infrastructure modes. To gain insight into the root-causes of the attack, the network is modeled as a dynamical system and its limiting behavior is analyzed. The model predicts that a phase transition (and hence a cascading attack) is possible when the retry limit parameter of Wi-Fi is greater or equal to 7. Next, the dissertation identifies a vulnerability at the physical layer of Wi-Fi that allows an adversary to launch cascading attacks with weak interferers. This vulnerability is induced by the state machine’s logic used for processing incoming packets. In contrast to the previous attack, this attack is effective even when interference caused by hidden nodes do not corrupt every packet transmission. The attack forces Wi-Fi rate adaptation algorithms to operate at a low bit rate and significantly degrades network performance, such as communication reliability and throughput. Finally, the dissertation proposes, analyzes, and simulates a method to prevent such attacks from occurring. The key idea is to optimize the duration of packet transmissions. To achieve this goal, it is essential to properly model the impact of MAC overhead, and in particular MAC timing parameters. A new theoretical model is thus proposed, which relates the utilization of neighboring pairs of nodes using a sequence of iterative equations and uses fixed point techniques to study the limiting behavior of the sequence. The analysis shows how to optimally set the packet duration so that, on the one hand, cascading DoS attacks are avoided and, on the other hand, throughput is maximized. The analytical results are validated by extensive ns-3 simulations. A key insight obtained from the analysis and simulations is that IEEE 802.11 networks with relatively large MAC overhead are less susceptible to cascading DoS attacks than networks with smaller MAC overhead.
APA, Harvard, Vancouver, ISO, and other styles
10

Hsu, An-Ti, and 許安迪. "The Research on Wi-Fi Positioning Spoofing Attacks and Authentication Protocols." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/s65ahr.

Full text
Abstract:
碩士
樹德科技大學
資訊工程系碩士班
104
Mobile phone technology is developing rapidly and it has many features to meet different needs. However, in the early stage no consideration to security mechanisms become obvious vulnerability. Wi-Fi positioning produced a problem. Wi-Fi positioning is based on the Media Access Control Address (MAC address) of the Access Point (AP), which can reduce positioning times and improve accuracy. However, the mobile phone apps can easily retrieve the MAC address of the AP and on the internet can also easily search public Wi-Fi AP''s MAC address map. it will be easier to collect by attacker, and Wi-Fi positioning is no authentication protocol to make spoofing attacks easily successful and easily forged real location. In this paper, we propose a combination of cryptographic systems and additional DD-WRT firmware AP, and named Authentication Protocol of Prevent Wi-Fi Positioning Spoofing Attacks. Since the MAC address with the authentication process, the server will be able to authentication the data that an attacker cannot use the collected MAC address to spoofing attacks. In this paper, we propose a Authentication protocol, it is combination of cryptographic systems and Wi-Fi AP equipped with DD-WRT firmware, Authentication protocol to Prevent Wi-Fi positioning spoofing attack, The Authentication protocol have three phase: 1. Registration Phase, 2. Examination Phase, 3. Positioning Authentication Phase, In Registration Phase, Mainly to be able to make Wi-Fi AP to Wi-Fi positioning system server to register their identity, Wi-Fi AP to generate a key, and the key to the Wi-Fi Positioning System server storage, the formation of symmetric key encryption method in the next authentication protocol requires authentication identity, Wi-Fi AP can use the key Response Wi-Fi positioning system server Challenge; In Examination Phase, because Wi-Fi AP did not pass examination, it is not using on the Wi-Fi positioning services. Pass Examination phase method is the use of counting, allowing users to agree to Wi-Fi positioning system server authority to collect information, The information collected is anonymous, Each a collection of information, the count will increase, When the count number reaches the threshold, Wi-Fi AP will pass Examination phase, The Wi-Fi AP information can be used for Wi-Fi positioning system server database, it can be used in Wi-Fi positioning services, In Positioning Authentication Phase, Mainly in the Wi-Fi Positioning, Wi-Fi positioning system server can authenticate the identity of the Wi-Fi AP, When the Wi-Fi AP can be authenticated identity, prevent spoofing attacks will become simple, The forged Wi-Fi AP or MAC address spoofing attacks will become difficult; Because Wi-Fi AP has a key, identity and MAC address can be authenticated, Wi-Fi positioning system server can be certified Wi-Fi AP or MAC address authenticity, Make forged Wi-Fi AP cannot using collected "MAC address" to spoofing attacks. However, when the Wi-Fi AP are moved (e.g. Kaohsiung to Taipei), Authentication protocol will have the possibility of authentication error. Thus, the authentication protocol will be improved. In improved authentication protocol, we let the user’s application provide more information. To confirm Wi-Fi AP exact location, authentication protocol will become more complete.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wi-Fi attacks"

1

Mastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wi-Fi attacks"

1

Noubir, Guevara, and Triet D. Vo-Huu. "DoS Attacks in Wi-Fi Networks." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1445-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Il-Gu, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, and Myungchul Kim. "Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks." In Research in Attacks, Intrusions and Defenses, 362–83. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vondráček, Martin, Jan Pluskal, and Ondřej Ryšavý. "Automation of MitM Attack on Wi-Fi Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 207–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73697-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Jin-Young, and Dea-Woo Park. "A Study on Wi-Fi Hacking Attack Using Web." In Convergence and Hybrid Information Technology, 464–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24082-9_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Kavita, and B. B. Gupta. "Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges." In Advances in Intelligent Systems and Computing, 555–61. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Wireless Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 244–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.

Full text
Abstract:
Wired networks add to cost and space required to setup while wireless networks are easy to expand without adding complexity of cables. Most organizations implement wireless networks as an extension to an existing wired connection by installing multiple access points at various locations to cover larger area. The wi-fi network users can be assigned limited and restricted access to the actual wired network and organizational resources. Although less reliable, wireless networks offer mobility, flexibility, ease of deployment, scalability with reduced cost of implementation. However, besides these many advantages, wireless network expands the security threat level by offering ease of intercepting network traffic to the hackers via open networks. Hence, there is a need to determine the potential wi-fi security threats, attacks, attacking tools, and possible countermeasures to be used to secure organizational wireless networks. This chapter focuses on different IEEE 802.11 wireless standards, authentication and association processes in 802.11, and WLAN frame structure. This chapter explains different wireless attacks like war-driving, war-chalking, wi-fi signal jamming, denial of service (DOS) attack, rogue access point attack, wireless traffic analysis, MAC spoofing, de-authentication attack, man-in-the-middle attack, evil twin attack, cracking wi-fi encryptions, spectrum analysis, bluetooth devices attacks, etc. The chapter also discusses different tools used for carrying out wireless attacks or auditing wireless security like NetStumbler, Kismet, Aircrack, insider, KisMAC, WEPWedgie, WIDZ, and Snort-wireless. The chapter also discusses countermeasures against these attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." In Research Anthology on Combating Denial-of-Service Attacks, 415–34. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch022.

Full text
Abstract:
This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of Denial of Service (DoS) attacks in a distributed environment that eliminates the availability of resources or data on a computer network. DDoS attack exhausts the network resources and disturbs the legitimate user. This article provides an explanation on DDoS attacks and nature of these attacks against Smartphones and Wi-Fi Technology and presents a taxonomy of various defense mechanisms. The smartphone is chosen for this study, as they have now become a necessity rather than a luxury item for the common people.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Vinoth, V. R. Niveditha, V. Muthukumaran, S. Satheesh Kumar, Samyukta D. Kumta, and Murugesan R. "A Quantum Technology-Based LiFi Security Using Quantum Key Distribution." In Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies, 104–16. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch007.

Full text
Abstract:
Light fidelity (Li-Fi) is a technology that is used to design a wireless network for communication using light. Current technology based on wireless fidelity (Wi-Fi) has some drawbacks that include speed and bandwidth limit, security issues, and attacks by malicious users, which yield Wi-Fi as less reliable compared to LiFi. The conventional key generation techniques are vulnerable to the current technological improvement in terms of computing power, so the solution is to introduce physics laws based on quantum technology and particle nature of light. Here the authors give a methodology to make the BB84 algorithm, a quantum cryptographic algorithm to generate the secret keys which will be shared by polarizing photons and more secure by eliminating one of its limitations that deals with dependency on the classical channel. The result obtained is sequence of 0 and 1, which is the secret key. The authors make use of the generated shared secret key to encrypt data using a one-time pad technique and transmit the encrypted data using LiFi and removing the disadvantage of the existing one-time pad technique.
APA, Harvard, Vancouver, ISO, and other styles
9

Mugavero, Roberto, Stanislav Abaimov, Federico Benolli, and Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." In Cyber Warfare and Terrorism, 931–63. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch056.

Full text
Abstract:
As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
10

Thiyagarajan, Kirubadevi, Ramamoorthy S, Neelavathy Pari S, and Rajakumar P S. "Device Authentication and Secure Routing in MANET for Internet of Things." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200159.

Full text
Abstract:
In the next generation of communication mobile adhoc network (MANET) will play a major role in Internet of Things (IoT).MANET can be defined as a network among a group of nodes with no infrastructure. Internet of Things is the composition of a variety of networks like Wi-Fi, ZigBee, Wireless Sensor Networks (WSNs). MANETs, and Radio Frequency Identifier (RFID). There is a need for the compatibility of MANET with IoT for the deployment of smart infrastructure. Authenticity and security in communication between devices are essential for the realization of IoT with MANET. Authentication and providing security in MANET are always challenging due to its mobility in nature. Devices in IoT are usually resource constrained in energy, memory, computation and bandwidth. Therefore, it is difficult for each node to authenticate all the devices in the network. In this paper, an authentication scheme is proposed without any third party provider to distinguish the authorized and unauthorized devices. This authentication consists of two level process; in the 1st level mutual devices are authenticated, and in the 2nd level secure data routing between the devices is carried out. Mutual authentication is performed by Clustering based on keys and unique identities and by the cluster heads interpreting for secure routing. This scheme ensures the early measure of authenticity for the message requested enters into the IoT networks and disagreement against attacks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wi-Fi attacks"

1

"SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki." In International Conference on Wireless Information Networks and Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0002027900960101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vanhoef, Mathy, and Frank Piessens. "Advanced Wi-Fi attacks using commodity hardware." In the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amoordon, Andy, Christophe Gransart, and Virginie Deniau. "Characterizing Wi-Fi Man-In-the-Middle Attacks." In 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS). IEEE, 2020. http://dx.doi.org/10.23919/ursigass49373.2020.9232270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khasanova, Adelya M. "Detection of Attacks on Wi-Fi Access Points." In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Canh Vu, Van, and Tuan-Hao Hoang. "Detect Wi-Fi Network Attacks Using Parallel Genetic Programming." In 2018 10th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 2018. http://dx.doi.org/10.1109/kse.2018.8573378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xin, Liangxiao, David Starobinski, and Guevara Noubir. "Cascading denial of service attacks on Wi-Fi networks." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xin, Liangxiao, and David Starobinski. "Cascading Attacks on Wi-Fi Networks with Weak Interferers." In MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242102.3242142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lounis, Karim, and Mohammad Zulkernine. "Exploiting Race Condition for Wi-Fi Denial of Service Attacks." In SIN 2020: 13th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433174.3433584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cominelli, Marco, Francesco Gringoli, and Renato Lo Cigno. "Non Intrusive Wi-Fi CSI Obfuscation Against Active Localization Attacks." In 2021 16th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS). IEEE, 2021. http://dx.doi.org/10.23919/wons51326.2021.9415586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vanhoef, Mathy, and Frank Piessens. "Denial of Service Attacks Against the 4-Way Wi-Fi Handshake." In 9th International Conference on Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography