2017
DOI: 10.14257/ijsia.2017.11.5.04
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Impersonation Attack in Wireless Networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…In this section we provide a brief introduction to impersonation attack and a possible mitigation. 18…”
Section: Impersonation Attack and Relative Mitigationmentioning
confidence: 99%
“…In this section we provide a brief introduction to impersonation attack and a possible mitigation. 18…”
Section: Impersonation Attack and Relative Mitigationmentioning
confidence: 99%
“…• Impersonation Attack: The attackers want to impersonate themselves either as a physical node or a unit of implicit node [16]. Such attacks are particularly easy to launch in IoT environments and can root significant harm to system performance [17]. [18].…”
Section: Threat Modelmentioning
confidence: 99%
“…Detecting impersonation attacks within a wireless network is complex; therefore, the advantage is with the attacker due to the simplicity of launching these attacks [ 18 ]. The difficulty in detecting and preventing impersonation attacks originates from the fact that many are based on the abuse of authorized commands within the IEEE 802.11 standard.…”
Section: Introductionmentioning
confidence: 99%