International Conference on Information Communication and Embedded Systems (ICICES2014) 2014
DOI: 10.1109/icices.2014.7033871
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of security issues and their solutions in wireless LAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Then they retransmit the frames to mimic the genuine users. In Figure 1, Darth captures the message from Bob originally meant for Alice, and later replay it to Alice [17][18][19]. The packets captured by the attacker can be analysed later to decipher its contents.…”
Section: Figure 1 Mitm Categories Of Attacks Towards Mutual Authenticationmentioning
confidence: 99%
“…Then they retransmit the frames to mimic the genuine users. In Figure 1, Darth captures the message from Bob originally meant for Alice, and later replay it to Alice [17][18][19]. The packets captured by the attacker can be analysed later to decipher its contents.…”
Section: Figure 1 Mitm Categories Of Attacks Towards Mutual Authenticationmentioning
confidence: 99%
“…Using the default SSID [22] for the wireless access point is discouraged by security experts as it offers hints to an attacker regarding the equipment manufacturer or internet provider. This information can then be exploited in order to use default credentials on forcing access to the network.…”
Section: Security Vulnerabilities and Their Extentmentioning
confidence: 99%
“…Compared to the wired network, WLAN is more vulnerable [5] [6] [7]. It is very easy to capture and analyze the transmitting message, because the medium of WLAN is shared.…”
Section: Introductionmentioning
confidence: 99%
“…Capturing and resolving the MAC frames are the technical basis of a real-time monitoring and analysis system, vulnerability scanning system and intrusion detection system for WLAN [6] [7] [8] [9] [10]. IEEE 802.11 MAC frames are categorized into three types: control frames, management frames, and data frames.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation