We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence cheap off-the-shelf WiFi dongles can be used carry out advanced attacks. We demonstrate this by implementing five low-layer attacks using open source Atheros firmware. The first attack consists of unfair channel usage, giving the user a higher throughput while reducing that of others. The second attack defeats countermeasures designed to prevent unfair channel usage. The third attack performs continuous jamming, making the channel unusable for other devices. For the fourth attack we implemented a selective jammer, allowing one to jam specific frames already in the air. The fifth is a novel channel-based Man-in-the-Middle (MitM) attack, enabl...
AbstractIn recent years, a significant increasing in development of Wireless networks is noticed; th...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence...
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordabl...
Wireless networks, especially those based on 802.11, have found widespread use in domestic, commerci...
This dissertation analyzes the security of popular network protocols. First we investigate the Wi-Fi...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Currently used wireless communication technologies suffer security weaknesses that can be exploited ...
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over Wireless ...
International audienceNumerous medium access control (MAC) have been proposed for Low-power Lossy Ne...
Wi-Fi (IEEE 802.11) is currently one of the primary media to access the Internet. Guaranteeing the a...
AbstractIn recent years, a significant increasing in development of Wireless networks is noticed; th...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
We show that low-layer attacks against WiFi can be implemented using user-modifiable firmware. Hence...
Wireless network technologies offer ubiquitous broadband access to millions of users at an affordabl...
Wireless networks, especially those based on 802.11, have found widespread use in domestic, commerci...
This dissertation analyzes the security of popular network protocols. First we investigate the Wi-Fi...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are ...
In our society, Wi-Fi devices increase at an exponential rate. Users are increasingly in need of wir...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
Currently used wireless communication technologies suffer security weaknesses that can be exploited ...
In this paper we investigate the resiliency to jamming of data protocols, such as IP, over Wireless ...
International audienceNumerous medium access control (MAC) have been proposed for Low-power Lossy Ne...
Wi-Fi (IEEE 802.11) is currently one of the primary media to access the Internet. Guaranteeing the a...
AbstractIn recent years, a significant increasing in development of Wireless networks is noticed; th...
The convenience of 802.11-based wireless access networks has led to widespread deployment in the con...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...