2022
DOI: 10.1007/s12652-022-03800-5
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of data link impersonation attack for wired LAN application layer services

Abstract: Impersonation attack, also known as MAC spoofing, is widespread in wireless local area networks. Under this attack, the senders cannot control the device that listens to their traffic. On the other hand, the physical layer of the wired local area network is more secure, where the traffic is transmitted through cables and network nodes to the intended receivers. Each network node builds its MAC address table, which states stations that are physically connected (directly or indirectly) to each port, so traffic e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
0
0
Order By: Relevance
“…User impersonation [7] is an attempt to substitute one user for another. The intruder, acting on behalf of one party and fully mimicking its actions, receives responses of a specific format necessary to forge individual protocol steps.…”
Section: Description Of Attacksmentioning
confidence: 99%
“…User impersonation [7] is an attempt to substitute one user for another. The intruder, acting on behalf of one party and fully mimicking its actions, receives responses of a specific format necessary to forge individual protocol steps.…”
Section: Description Of Attacksmentioning
confidence: 99%
“…The value of σ2 is obtained using the error mean square, MS E . The positive square root of C jj represents the estimated standard deviation of the j th regression coefficient, βj , and it is known as the estimated standard error of βj (abbreviated as se( βj )) and calculated as given in Equation (10).…”
Section: Estimating Linear Regression Models Using Least Squaresmentioning
confidence: 99%
“…To run the algorithm, 'N' is first set as 20, which is the number of nodes/computers connected to the WLAN, 'A' is set to be 7, which is the average packet arrival rate (packets per second), 'R' = 1 (10,6) (10,6), which is the speed of the LAN/channel/bus (in bps), and 'L' is set as 1500, which is the packet length (in bits).…”
Section: Initialization Of Parametersmentioning
confidence: 99%