The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can implement MAC address spoofing techniques to launch these attacks, while masquerading themselves behind a false MAC address. The implementation of Intrusion Detection Systems has become fundamental in the development of security infrastructures for wireless networks. This thesis proposes the designing a novel security system that makes use of metrics from multiple layers of observation to produce a collective decision on whether an attack is taking place. The Dempster-Shafer Theory of Evidence is the data fusion technique used to combine the evidences from the different layers. A novel, unsupervised and self- adaptive Basic Probability Assignment (...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
The fast growth of wireless network technology has been very significant lately, its occurs in diver...
Wireless ad hoc network operates without any fixed infrastructure and centralized administration. It...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker m...
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the c...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Media Access Control (MAC) addresses in wireless networks can be trivially spoofed using off-the-she...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
YesThe broadcast nature of wireless local area networks has made them prone to several types of wir...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
The fast growth of wireless network technology has been very significant lately, its occurs in diver...
Wireless ad hoc network operates without any fixed infrastructure and centralized administration. It...
open access articleThe broadcast nature of Wireless Local Area Networks (WLANs) has made them prone ...
Wireless networks are increasingly becoming susceptible to more sophisticated threats. An attacker m...
Wireless networks are becoming susceptible to increasingly more sophisticated threats. Most of the c...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
The pervasiveness of wireless devices and the architectural organization of wireless networks in dis...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
Media Access Control (MAC) addresses in wireless networks can be trivially spoofed using off-the-she...
Abuse attacks on wireless networks are becoming increasingly sophisticated. Most of the recent resea...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
YesThe broadcast nature of wireless local area networks has made them prone to several types of wir...
Computer networks and more specifically wireless communication networks are increasingly becoming su...
The airborne nature of wireless transmission offers a potential target for attackers to compromise I...
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a la...
The fast growth of wireless network technology has been very significant lately, its occurs in diver...
Wireless ad hoc network operates without any fixed infrastructure and centralized administration. It...