The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the change of gateway\u27s public IP address by switching from one Access P...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports a...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
Wi-Fi (IEEE 802.11) is currently one of the primary media to access the Internet. Guaranteeing the a...
The technology of wireless network systems has eased the possibility to communicate utilising the el...
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet...
Today’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc commu...
Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand ...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless Local Area Networks (WLANs), widely prevalent in corporate environments, is a current giant...
Wireless technologies like Wireless LAN (WLAN) 802.11 picking up ubiquity in all associations, under...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports a...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
Wi-Fi (IEEE 802.11) is currently one of the primary media to access the Internet. Guaranteeing the a...
The technology of wireless network systems has eased the possibility to communicate utilising the el...
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet...
Today’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc commu...
Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand ...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address ma...
Wireless Local Area Networks (WLANs), widely prevalent in corporate environments, is a current giant...
Wireless technologies like Wireless LAN (WLAN) 802.11 picking up ubiquity in all associations, under...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
© 2011 International Federation for Information Processing. This is the accepted manuscript version ...