2005 International Conference on Wireless Networks, Communications and Mobile Computing
DOI: 10.1109/wirles.2005.1549425
|View full text |Cite
|
Sign up to set email alerts
|

Security in an Insecure WLAN Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Sequence number approaches [79][80][81][82][83] detect MAC address spoofing attacks, such as deauthentication attacks. These approaches assume that the legitimate wireless user generates a sequence of numbers, so it is hard for an adversary to manipulate the sequence to match the legitimate one.…”
Section: Deauthentication/disassociation Countermeasuresmentioning
confidence: 99%
“…Sequence number approaches [79][80][81][82][83] detect MAC address spoofing attacks, such as deauthentication attacks. These approaches assume that the legitimate wireless user generates a sequence of numbers, so it is hard for an adversary to manipulate the sequence to match the legitimate one.…”
Section: Deauthentication/disassociation Countermeasuresmentioning
confidence: 99%
“…Anjum et al . proposed a secure wireless system that uses monitoring at the local and global levels. The local monitor is attached at the AP level to analyze the Layer‐2 traffic, while a global monitor is connected via wired connection to the backbone network and also to the local monitors to analyze the Layer‐3 traffic.…”
Section: Protection Against Dos Attacksmentioning
confidence: 99%
“…There are few solutions (Category V, Table ) that are proposed, keeping in view the DoS threat caused using deauthentication/disassociation frames. The secure wireless scheme is similar to other spoof‐reducing schemes of Category I. Letter‐Envelop Protocol is a small but effective scheme to protect against deauthentication/disassociation DoS attacks. Here, the computation time is required to calculate the prime numbers, and the frame is modified to accommodate the prime numbers.…”
Section: Comparison Of Dos Solutions In Ieee 80211imentioning
confidence: 99%
“…Also in the case when multiple IP address are assigned to same NIC the solution fails [8], [9]. • Guo et al [10], Wright [11], Mar et al [12], Xia et al [13] and Anjum et al [14] have suggested various schemes for detection of spoofing attacks based on the sequence number analysis. However a clever attacker can predict the sequence number in advance to escape detection.…”
Section: Related Work and Motivationmentioning
confidence: 99%