A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods
2009
International Journal of Network Security
But since MAC addresses can be spoofed very easily, improved mechanisms are needed to attest the uniqueness of a dedicated wireless station. ...
One attempt to solve this problem is the use of access control lists, which are associated with accredited MAC addresses. ...
Spoofing a MAC address is basically identity theft and denotes the altering of the MAC address on a NIC [3] . ...
dblp:journals/ijnsec/LacknerPT09
fatcat:lno7qjzp3zesherda62xnsozpq
Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014
2018
International Journal of Trend in Scientific Research and Development
Spoof attack suppression by the biometric information incorporation is the new and modern method of and as well suppression the attack online as well off line. ...
Wireless networks provide various real world. This can help businesses to increase the productivity, lower cost and effectiveness, increase scalability and improve relationship wit ...
Recently, new approaches utilizing physical properties associated with wireless transmission to combat attacks in wireless networks have been proposed. ...
doi:10.31142/ijtsrd15801
fatcat:p2qz2htdcjc6ndmiifxx3ak7yy
Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks
english
2015
International Journal of Innovative Research in Computer and Communication Engineering
english
Communication in wireless network is critical and challenging issue. Wireless spoofing attacks are occurs easily and reduce the networks performance. ...
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. ...
During passive monitoring it is easy to get MAC address for the attackers and modify its MAC address by using ifconfig command to masquerade as another device. ...
doi:10.15680/ijircce.2015.0305021
fatcat:rz2a3fdgtndzfbgtf33kdxfbpe
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review
[article]
2022
arXiv
pre-print
Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted Wi-Fi wireless frames between two legitimate endpoints. ...
On the other hand, the second interface spoofs the client by cloning the client's MAC address for the real AP. ...
For example, by spoofing the MAC address of the AP, the attacker can send deauthentication or disassociation frames to the client. ...
arXiv:2203.00579v1
fatcat:zvgulgm4lvcf3h6ya7i7sakpfu
Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
2008
ChoiceReviews
Preface We have entered the era of wireless networks. By now, the number of wireless phones has superseded that of wired ones. Wireless LANs are routinely used by millions of nomadic users. ...
Even existing wireless networks (and especially wireless LANs) exhibit a number of security weaknesses, some of which have been painstakingly fixed a posteriori. ...
Chapter 5; Mario again, as his research was also a direct source of inspiration for Chapter 9, as was also the research carried out by Maxim Raya, Imad Aad, and Alaeddine El Fawal; Maxim again, along with ...
doi:10.5860/choice.46-1524
fatcat:3bkyxjix2vcabcn3f45pqd4vn4
A Survey on Machine-Learning Techniques for UAV-Based Communications
2019
Sensors
Unmanned aerial vehicles (UAVs) will be an integral part of the next generation wireless communication networks. ...
Furthermore, the integration of artificial intelligence (AI) and machine-learning (ML) techniques in wireless networks can leverage intelligence for addressing various issues. ...
Data Link and Network Layers Issues In hierarchical based networks, several challenges exist when applying ML and DL techniques in MAC and routing protocols. ...
doi:10.3390/s19235170
pmid:31779133
pmcid:PMC6929112
fatcat:pnur7lmpj5bj7poebmdfpd6bhi
An application layer non-repudiation wireless system: A cross-layer approach
2010
2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
This leads to a cross layer design, which considers various QoS and security parameters export and import to and from various layers with a special focus on the application layer. ...
This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics. ...
STA Wireless MAC address 4). AP nonce (ANonce), and 5). AP Wireless MAC address. ...
doi:10.1109/wowmom.2010.5534971
dblp:conf/wowmom/Adibi10
fatcat:tzhws7t5tzao7eh7qcxfn5srfy
A Survey on Consumer IoT Traffic: Security and Privacy
[article]
2024
arXiv
pre-print
In this survey, we try to figure out what researchers can learn about the security and privacy of CIoT by traffic analysis, a popular method in the security community. ...
Then, we detail existing works based on five application goals: device fingerprinting, user activity inference, malicious traffic analysis, security analysis, and measurement. ...
Existing methods are primarily based on wireless protocols, with very few addressing devices that use protocols such as Zigbee or Bluetooth. ...
arXiv:2403.16149v1
fatcat:mldnbdcv4fhepa4cut73ns75w4
A layered approach to cognitive radio network security: A survey
2014
Computer Networks
The threats provided are organized according to the protocol layer at which the attack is targeted. ...
With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant. ...
With a radio fingerprint, a wireless device can be identified by its unique transmission characteristics. ...
doi:10.1016/j.comnet.2014.10.001
fatcat:eo4kskzcbzdvfap7srpsdhxkpy
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic
2020
Journal of Information Security
The independent variable weights were determined by calculating the effects of combining or layering the independent variables. ...
The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. ...
Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN [4] . ...
doi:10.4236/jis.2020.114017
fatcat:cdjl2ujxcvf3vjuncwfnfqrbn4
A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching
2015
Mathematical Problems in Engineering
This paper addresses this common DoS attack and proposes a lightweight puzzle, based on pattern-matching. ...
To handle a burst of connection requests containing spoofed or unauthenticated MAC addresses, the AP has to exhaust more resources to generate more puzzles. This may lead to memory exhaustion. ...
fingerprint. ...
doi:10.1155/2015/707548
fatcat:wrqredbqenekhgnwrby7lhfpci
Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives
2023
Sensors
With this aim, a variety of publications between 2016 and 2023 from "Web-of-Science" and "Scopus" databases were analysed. ...
As the IOMV communicates with a variety of networks along its travel path, it incurs various security risks due to sophisticated cyber-attacks. This can endanger the onboard patient's life. ...
unreliable wireless and mobile network. ...
doi:10.3390/s23198107
pmid:37836937
pmcid:PMC10575081
fatcat:52sgbw2xsrepxb3ofg2gfjkzxy
Cybersecurity: Past, Present and Future
[article]
2023
arXiv
pre-print
To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments. ...
With these improvements come new challenges, and one of the main challenges is security. The security of the new cyberspace is called cybersecurity. ...
We also list some of the spoofing and anti-spoofing techniques used for each method.
Fingerprinting Fingerprinting is the oldest method in use for identifying a person. ...
arXiv:2207.01227v2
fatcat:54sdflwghrcd3dqodwn4fygtei
Protean Authentication Scheme - A Time-bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments
2019
IEEE Access
The IoT edge/sensor nodes are exposed to large attack surface and could easily succumb to several well-known attacks in the wireless sensor network (WSN) domain. ...
This paper focuses on developing an extremely lightweight authentication scheme for constrained end-devices that are part of a given IoT LAN. ...
of spoofing MACs for other messages. ...
doi:10.1109/access.2019.2927818
fatcat:2qdbzwxxczajha62yvxg5567sm
Protecting a Corporate Network from Insider, Outsider and Collaborative Attacks
2022
At the Layer-2 frame, MAC SRC is the MAC address of the DHCP server and the MAC DES is the MAC address of P 1 . At Layer-2, it is a unicast frame. ...
For the Layer-2 frame, the MAC-SRC is the MAC address of P 1 , and the destination MAC address is the MAC address of H 1 . ...
In all other experiments except NAT++, the LAN switches work as a Layer-2 device. However, in NAT++, it has to perform the NATting process. ...
doi:10.26181/21671909.v1
fatcat:d3f52fpztbbebavqpj2hcngnkq
« Previous
Showing results 1 — 15 out of 51 results