2014 International Conference on Communication and Signal Processing 2014
DOI: 10.1109/iccsp.2014.6949811
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing attack: Preventing in wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…An attacker can use this technique to intercept, manipulate, or even interrupt data in transit, allowing them to carry out other types of exploits like denial-of-service, eavesdropping, session hijacking, and man-in-the-middle attacks. Only local area networks that use the Address Resolution Protocol are vulnerable to ARP spoofing attacks [ 69 ].…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%
“…An attacker can use this technique to intercept, manipulate, or even interrupt data in transit, allowing them to carry out other types of exploits like denial-of-service, eavesdropping, session hijacking, and man-in-the-middle attacks. Only local area networks that use the Address Resolution Protocol are vulnerable to ARP spoofing attacks [ 69 ].…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%