scispace - formally typeset
Open AccessJournal Article

Wireless networks: developments, threats and countermeasures

Reads0
Chats0
TLDR
The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.
Abstract
This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

read more

Citations
More filters
Book ChapterDOI

Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack

TL;DR: In this article, an automated system is proposed to crack the WPA2 passphrase much efficiently, and two different schemes are introduced which can improve the dictionary attack and overcome the existing issues.
Proceedings ArticleDOI

An Overview of Protocols-Based Security Threats and Countermeasures in WLAN

Nitish Ojha, +1 more
TL;DR: In this paper , the authors reviewed many researchers' techniques and works on the WLAN security topic, there are shared threats to WLAN and the ways of taking precautions against those threats as countermeasures and for which the tables are used.
Journal ArticleDOI

A Study of Distinctive tools to hack wireless network

TL;DR: The tools implied to hack a wireless network and the weakness of WEP key in the wireless network due to which these are hacked are discussed.
Proceedings ArticleDOI

Physical Dangers in the Cyber Security and Precautions to be Taken

TL;DR: The main hardware tools used by the cyber attackers to exploit the systems, analyzed deeply, the hardware specifications of these tools, the targeted systems and the types of the attacks are investigated.
Journal Article

An in-memory approach to sentiment analysis based on sap hana

TL;DR: This paper describes and evaluates a lexicon-based SA solution, implemented as a prototype using SAP HANA, and results are made available on a user interface created using SAP's current interface technology, SAPUI5.
References
More filters
Proceedings ArticleDOI

Practical attacks against WEP and WPA

TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs: improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key, and dictionary attack when a weak pre-shared key is used.
Proceedings ArticleDOI

Who is peeping at your passwords at Starbucks? — To catch an evil twin access point

TL;DR: This work proposes a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects and can identify evil twins with a very high detection rate while keeping a very low false positive rate.
Proceedings ArticleDOI

Cloud computing and security challenges

TL;DR: Cloud Computing services including data storage service, cloud computing operating system and software as a service will be introduced, Cloud Computing security challenges will be discussed and Cisco Secure Cloud Data Center Framework will be presented.
Journal ArticleDOI

Selective jamming/dropping insider attacks in wireless mesh networks

TL;DR: Various forms of sophisticated attacks launched from adversaries with internal access to the WMN are described and possible detection and mitigation mechanisms are identified.
Proceedings ArticleDOI

A Novel Approach for Rogue Access Point Detection on the Client-Side

TL;DR: This method compares the gateways and the routes that a packet travels to determine whether an access point is legitimate or not and can easily detect Man-In-The-Middle and evil twin attack without any assistance from the WLAN operator.
Related Papers (5)