Open AccessJournal Article
Wireless networks: developments, threats and countermeasures
Reads0
Chats0
TLDR
The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.Abstract:
This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.read more
Citations
More filters
Journal ArticleDOI
Health professionals' knowledge and attitude towards patient confidentiality and associated factors in a resource-limited setting: a cross-sectional study
Masresha Derese Tegegne,Mequannent Sharew Melaku,Aynadis Worku Shimie,Degefaw Denekew Hunegnaw,Meseret Gashaw Legese,Tewabe Ambaye Ejigu,N. D. Mengestie,Wondewossen Zemene,Tirualem Zeleke,Ashenafi Fentahun Chanie +9 more
TL;DR: In this article , the authors assess health professionals' knowledge, attitudes, and associated factors towards patients' confidentiality in a resource-limited setting, and reveal that health professionals have a limited attitude towards patient confidentiality but have relatively good knowledge.
Journal ArticleDOI
The rogue access point identification: a model and classification review
TL;DR: This research aims to explore the various methods on how to distinguish the AP, as a rogue or legitimate, based on the hardware and software approach model, and produced an alternative solution using beacon frame manipulation technique.
Proceedings ArticleDOI
Experiences in Secure Integration of Byod
Mohamed Amoud,Ounsa Roudies +1 more
TL;DR: A Systematic Literature Review (SLR) of BYOD published research articles is presented to answer the following question: "How to integrate securely a BYOD in an Enterprise".
Journal ArticleDOI
Securing wireless mobile nodes from distributed denial-of-service attacks
TL;DR: This paper proposes techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices and describes the operation and architectural components of the model that is able to efficiently deal with the attacks.
References
More filters
Proceedings ArticleDOI
Practical attacks against WEP and WPA
Erik Tews,Martin Beck +1 more
TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs: improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key, and dictionary attack when a weak pre-shared key is used.
Proceedings ArticleDOI
Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
Yimin Song,Chao Yang,Guofei Gu +2 more
TL;DR: This work proposes a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects and can identify evil twins with a very high detection rate while keeping a very low false positive rate.
Proceedings ArticleDOI
Cloud computing and security challenges
TL;DR: Cloud Computing services including data storage service, cloud computing operating system and software as a service will be introduced, Cloud Computing security challenges will be discussed and Cisco Secure Cloud Data Center Framework will be presented.
Journal ArticleDOI
Selective jamming/dropping insider attacks in wireless mesh networks
Loukas Lazos,Marwan Krunz +1 more
TL;DR: Various forms of sophisticated attacks launched from adversaries with internal access to the WMN are described and possible detection and mitigation mechanisms are identified.
Proceedings ArticleDOI
A Novel Approach for Rogue Access Point Detection on the Client-Side
TL;DR: This method compares the gateways and the routes that a packet travels to determine whether an access point is legitimate or not and can easily detect Man-In-The-Middle and evil twin attack without any assistance from the WLAN operator.
Related Papers (5)
A new virtualization-based security architecture in a cloud computing environment
Lena AlMutair,Soha S. Zaghloul +1 more