Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








51 Hits in 5.0 sec

Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods

Günther Lackner, Udo Payer, Peter Teufl
2009 International Journal of Network Security  
But since MAC addresses can be spoofed very easily, improved mechanisms are needed to attest the uniqueness of a dedicated wireless station.  ...  One attempt to solve this problem is the use of access control lists, which are associated with accredited MAC addresses.  ...  Spoofing a MAC address is basically identity theft and denotes the altering of the MAC address on a NIC [3] .  ... 
dblp:journals/ijnsec/LacknerPT09 fatcat:lno7qjzp3zesherda62xnsozpq

Novel Promising Algorithm to suppress Spoof Attack by Cryptography Firewall2014

Prof Hadadi Sudheendra, Dr. N Krishnamurthy
2018 International Journal of Trend in Scientific Research and Development  
Spoof attack suppression by the biometric information incorporation is the new and modern method of and as well suppression the attack online as well off line.  ...  Wireless networks provide various real world. This can help businesses to increase the productivity, lower cost and effectiveness, increase scalability and improve relationship wit  ...  Recently, new approaches utilizing physical properties associated with wireless transmission to combat attacks in wireless networks have been proposed.  ... 
doi:10.31142/ijtsrd15801 fatcat:p2qz2htdcjc6ndmiifxx3ak7yy

Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks
english

Pallavi D.Sontakke, Prof.Dr.C.A.Dhote
2015 International Journal of Innovative Research in Computer and Communication Engineering  
Communication in wireless network is critical and challenging issue. Wireless spoofing attacks are occurs easily and reduce the networks performance.  ...  Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks.  ...  During passive monitoring it is easy to get MAC address for the attackers and modify its MAC address by using ifconfig command to masquerade as another device.  ... 
doi:10.15680/ijircce.2015.0305021 fatcat:rz2a3fdgtndzfbgtf33kdxfbpe

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review [article]

Manesh Thankappan, Helena Rifà-Pous, Carles Garrigues
2022 arXiv   pre-print
Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted Wi-Fi wireless frames between two legitimate endpoints.  ...  On the other hand, the second interface spoofs the client by cloning the client's MAC address for the real AP.  ...  For example, by spoofing the MAC address of the AP, the attacker can send deauthentication or disassociation frames to the client.  ... 
arXiv:2203.00579v1 fatcat:zvgulgm4lvcf3h6ya7i7sakpfu

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
Preface We have entered the era of wireless networks. By now, the number of wireless phones has superseded that of wired ones. Wireless LANs are routinely used by millions of nomadic users.  ...  Even existing wireless networks (and especially wireless LANs) exhibit a number of security weaknesses, some of which have been painstakingly fixed a posteriori.  ...  Chapter 5; Mario again, as his research was also a direct source of inspiration for Chapter 9, as was also the research carried out by Maxim Raya, Imad Aad, and Alaeddine El Fawal; Maxim again, along with  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

A Survey on Machine-Learning Techniques for UAV-Based Communications

Petros S Bithas, Emmanouel T Michailidis, Nikolaos Nomikos, Demosthenes Vouyioukas, Athanasios G Kanatas
2019 Sensors  
Unmanned aerial vehicles (UAVs) will be an integral part of the next generation wireless communication networks.  ...  Furthermore, the integration of artificial intelligence (AI) and machine-learning (ML) techniques in wireless networks can leverage intelligence for addressing various issues.  ...  Data Link and Network Layers Issues In hierarchical based networks, several challenges exist when applying ML and DL techniques in MAC and routing protocols.  ... 
doi:10.3390/s19235170 pmid:31779133 pmcid:PMC6929112 fatcat:pnur7lmpj5bj7poebmdfpd6bhi

An application layer non-repudiation wireless system: A cross-layer approach

Sasan Adibi
2010 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)  
This leads to a cross layer design, which considers various QoS and security parameters export and import to and from various layers with a special focus on the application layer.  ...  This thesis considers this issue in a wireless medium and studies the Quality of Service (QoS)/Security requirements in terms of network parameters and performance metrics.  ...  STA Wireless MAC address 4). AP nonce (ANonce), and 5). AP Wireless MAC address.  ... 
doi:10.1109/wowmom.2010.5534971 dblp:conf/wowmom/Adibi10 fatcat:tzhws7t5tzao7eh7qcxfn5srfy

A Survey on Consumer IoT Traffic: Security and Privacy [article]

Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Fangming Wang, Yu Zhang, Zheli Liu
2024 arXiv   pre-print
In this survey, we try to figure out what researchers can learn about the security and privacy of CIoT by traffic analysis, a popular method in the security community.  ...  Then, we detail existing works based on five application goals: device fingerprinting, user activity inference, malicious traffic analysis, security analysis, and measurement.  ...  Existing methods are primarily based on wireless protocols, with very few addressing devices that use protocols such as Zigbee or Bluetooth.  ... 
arXiv:2403.16149v1 fatcat:mldnbdcv4fhepa4cut73ns75w4

A layered approach to cognitive radio network security: A survey

Deanna Hlavacek, J. Morris Chang
2014 Computer Networks  
The threats provided are organized according to the protocol layer at which the attack is targeted.  ...  With the realization of cognitive radio networks came the recognition that both new and old security threats are relevant.  ...  With a radio fingerprint, a wireless device can be identified by its unique transmission characteristics.  ... 
doi:10.1016/j.comnet.2014.10.001 fatcat:eo4kskzcbzdvfap7srpsdhxkpy

Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic

Rodney Alexander
2020 Journal of Information Security  
The independent variable weights were determined by calculating the effects of combining or layering the independent variables.  ...  The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats.  ...  Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN [4] .  ... 
doi:10.4236/jis.2020.114017 fatcat:cdjl2ujxcvf3vjuncwfnfqrbn4

A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching

Ali Ordi, Mazdak Zamani, Norbik Bashah Idris, Azizah Abdul Manaf, Mohd Shahidan Abdullah
2015 Mathematical Problems in Engineering  
This paper addresses this common DoS attack and proposes a lightweight puzzle, based on pattern-matching.  ...  To handle a burst of connection requests containing spoofed or unauthenticated MAC addresses, the AP has to exhaust more resources to generate more puzzles. This may lead to memory exhaustion.  ...  fingerprint.  ... 
doi:10.1155/2015/707548 fatcat:wrqredbqenekhgnwrby7lhfpci

Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives

Chidambar Rao Bhukya, Prabhat Thakur, Bhavesh Raju Mudhivarthi, Ghanshyam Singh
2023 Sensors  
With this aim, a variety of publications between 2016 and 2023 from "Web-of-Science" and "Scopus" databases were analysed.  ...  As the IOMV communicates with a variety of networks along its travel path, it incurs various security risks due to sophisticated cyber-attacks. This can endanger the onboard patient's life.  ...  unreliable wireless and mobile network.  ... 
doi:10.3390/s23198107 pmid:37836937 pmcid:PMC10575081 fatcat:52sgbw2xsrepxb3ofg2gfjkzxy

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2023 arXiv   pre-print
To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments.  ...  With these improvements come new challenges, and one of the main challenges is security. The security of the new cyberspace is called cybersecurity.  ...  We also list some of the spoofing and anti-spoofing techniques used for each method. Fingerprinting Fingerprinting is the oldest method in use for identifying a person.  ... 
arXiv:2207.01227v2 fatcat:54sdflwghrcd3dqodwn4fygtei

Protean Authentication Scheme - A Time-bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments

S. Sathyadevan, K. Achuthan, R. Doss, L.Pan
2019 IEEE Access  
The IoT edge/sensor nodes are exposed to large attack surface and could easily succumb to several well-known attacks in the wireless sensor network (WSN) domain.  ...  This paper focuses on developing an extremely lightweight authentication scheme for constrained end-devices that are part of a given IoT LAN.  ...  of spoofing MACs for other messages.  ... 
doi:10.1109/access.2019.2927818 fatcat:2qdbzwxxczajha62yvxg5567sm

Protecting a Corporate Network from Insider, Outsider and Collaborative Attacks

Dalal Hanna
2022
At the Layer-2 frame, MAC SRC is the MAC address of the DHCP server and the MAC DES is the MAC address of P 1 . At Layer-2, it is a unicast frame.  ...  For the Layer-2 frame, the MAC-SRC is the MAC address of P 1 , and the destination MAC address is the MAC address of H 1 .  ...  In all other experiments except NAT++, the LAN switches work as a Layer-2 device. However, in NAT++, it has to perform the NATting process.  ... 
doi:10.26181/21671909.v1 fatcat:d3f52fpztbbebavqpj2hcngnkq
« Previous Showing results 1 — 15 out of 51 results