scispace - formally typeset
Open AccessJournal Article

Wireless networks: developments, threats and countermeasures

Reads0
Chats0
TLDR
The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.
Abstract
This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

read more

Citations
More filters
Journal ArticleDOI

Health professionals' knowledge and attitude towards patient confidentiality and associated factors in a resource-limited setting: a cross-sectional study

TL;DR: In this article , the authors assess health professionals' knowledge, attitudes, and associated factors towards patients' confidentiality in a resource-limited setting, and reveal that health professionals have a limited attitude towards patient confidentiality but have relatively good knowledge.
Journal ArticleDOI

The rogue access point identification: a model and classification review

TL;DR: This research aims to explore the various methods on how to distinguish the AP, as a rogue or legitimate, based on the hardware and software approach model, and produced an alternative solution using beacon frame manipulation technique.
Proceedings ArticleDOI

Experiences in Secure Integration of Byod

TL;DR: A Systematic Literature Review (SLR) of BYOD published research articles is presented to answer the following question: "How to integrate securely a BYOD in an Enterprise".
Journal ArticleDOI

Securing wireless mobile nodes from distributed denial-of-service attacks

TL;DR: This paper proposes techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices and describes the operation and architectural components of the model that is able to efficiently deal with the attacks.
References
More filters
Proceedings ArticleDOI

Practical attacks against WEP and WPA

TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs: improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key, and dictionary attack when a weak pre-shared key is used.
Proceedings ArticleDOI

Who is peeping at your passwords at Starbucks? — To catch an evil twin access point

TL;DR: This work proposes a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects and can identify evil twins with a very high detection rate while keeping a very low false positive rate.
Proceedings ArticleDOI

Cloud computing and security challenges

TL;DR: Cloud Computing services including data storage service, cloud computing operating system and software as a service will be introduced, Cloud Computing security challenges will be discussed and Cisco Secure Cloud Data Center Framework will be presented.
Journal ArticleDOI

Selective jamming/dropping insider attacks in wireless mesh networks

TL;DR: Various forms of sophisticated attacks launched from adversaries with internal access to the WMN are described and possible detection and mitigation mechanisms are identified.
Proceedings ArticleDOI

A Novel Approach for Rogue Access Point Detection on the Client-Side

TL;DR: This method compares the gateways and the routes that a packet travels to determine whether an access point is legitimate or not and can easily detect Man-In-The-Middle and evil twin attack without any assistance from the WLAN operator.
Related Papers (5)