Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usabilit...
MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerabi...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
In order to provide hassle-free connection options many wireless local area network (WLAN) providers...
Abstract—A great variety of well-known attacks exist for the IEEE 802.11 protocol. The lack of mecha...
Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (R...
The background for this masters thesis is the threat of session hijacking in public wireless network...
Abstract — Wireless network is the network which is easy to deploy and very easy to access that netw...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The explosive growth of 802.11 networks has coincided with increased presence of security treat to t...
Open wireless networks are commonly deployed as a result of easy access, user-friendliness, as well ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerabi...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
In order to provide hassle-free connection options many wireless local area network (WLAN) providers...
Abstract—A great variety of well-known attacks exist for the IEEE 802.11 protocol. The lack of mecha...
Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (R...
The background for this masters thesis is the threat of session hijacking in public wireless network...
Abstract — Wireless network is the network which is easy to deploy and very easy to access that netw...
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as...
Wireless networks are nowadays indispensable components of telecommunication infrastructures. They o...
The explosive growth of 802.11 networks has coincided with increased presence of security treat to t...
Open wireless networks are commonly deployed as a result of easy access, user-friendliness, as well ...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerabi...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...