Literatura académica sobre el tema "Wi-Fi attacks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Wi-Fi attacks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Wi-Fi attacks"
Dagelić, Ante, Toni Perković, Bojan Vujatović y Mario Čagalj. "SSID Oracle Attack on Undisclosed Wi-Fi Preferred Network Lists". Wireless Communications and Mobile Computing 2018 (22 de julio de 2018): 1–15. http://dx.doi.org/10.1155/2018/5153265.
Texto completoReyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza y Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames". Scientia et Technica 25, n.º 3 (30 de septiembre de 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.
Texto completoKohlios, Christopher y Thaier Hayajneh. "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3". Electronics 7, n.º 11 (30 de octubre de 2018): 284. http://dx.doi.org/10.3390/electronics7110284.
Texto completo., Rabia, Naveed Ali, Shahzaib Ali, Ahthasham Sajid y Afia Zafar. "A SECURITY REVIEW OVER WI-FI AND LI-FI". Information Management and Computer Science 3, n.º 1 (6 de abril de 2020): 01–09. http://dx.doi.org/10.26480/imcs.01.2020.01.09.
Texto completoChen, Yongle, Xiaojian Wang, Yuli Yang y Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract". Sensors 20, n.º 4 (15 de febrero de 2020): 1062. http://dx.doi.org/10.3390/s20041062.
Texto completoXin, Liangxiao, David Starobinski y Guevara Noubir. "Cascading Attacks on Wi-Fi Networks: Theory and Experiments". IEEE Transactions on Control of Network Systems 7, n.º 4 (diciembre de 2020): 1757–68. http://dx.doi.org/10.1109/tcns.2020.2999452.
Texto completoA. Reyes, Abel, Francisco D. Vaca, Gabriel A. Castro Aguayo, Quamar Niyaz y Vijay Devabhaktuni. "A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System". Electronics 9, n.º 10 (15 de octubre de 2020): 1689. http://dx.doi.org/10.3390/electronics9101689.
Texto completoPark, Min-Woo, Young-Hyun Choi, Jung-Ho Eom y Tai-Myoung Chung. "Dangerous Wi-Fi access point: attacks to benign smartphone applications". Personal and Ubiquitous Computing 18, n.º 6 (29 de octubre de 2013): 1373–86. http://dx.doi.org/10.1007/s00779-013-0739-y.
Texto completoXin, Liangxiao y David Starobinski. "Countering Cascading Denial of Service Attacks on Wi-Fi Networks". IEEE/ACM Transactions on Networking 29, n.º 3 (junio de 2021): 1335–48. http://dx.doi.org/10.1109/tnet.2021.3062363.
Texto completoSharma, Kavita y B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices". International Journal of E-Services and Mobile Applications 10, n.º 2 (abril de 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Texto completoTesis sobre el tema "Wi-Fi attacks"
Matte, Célestin. "Wi-Fi tracking : Fingerprinting attacks and counter-measures". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSEI114/document.
Texto completoThe recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole. These devices continuously emit signals which can be captured by a passive attacker using cheap hardware and basic knowledge. These signals contain a unique identifier, called the MAC address. To mitigate the threat, device vendors are currently deploying a countermeasure on new devices: MAC address randomization. Unfortunately, we show that this mitigation, in its current state, is insufficient to prevent tracking. To do so, we introduce several attacks, based on the content and the timing of emitted signals. In complement, we study implementations of MAC address randomization in some recent devices, and find a number of shortcomings limiting the efficiency of these implementations at preventing device tracking. At the same time, we perform two real-world studies. The first one considers the development of actors exploiting this issue to install Wi-Fi tracking systems. We list some real-world installations and discuss their various aspects, including regulation, privacy implications, consent and public acceptance. The second one deals with the spread of MAC address randomization in the devices population. Finally, we present two tools: an experimental Wi-Fi tracking system for testing and public awareness raising purpose, and a tool estimating the uniqueness of a device based on the content of its emitted signals even if the identifier is randomized
Wang, Le. "Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques". Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-theses/992.
Texto completoStehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.
Texto completoEndrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Texto completoDvorský, Radovan. "Detekce útoků na WiFi sítě pomocí získávaní znalostí". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236114.
Texto completoForsman, Erik y Andreas Skoglund. "Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup". Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20406.
Texto completoWi-Fi protected setup (WPS), a protocol used to configure wireless clients, isflawed in regard to the design of the authentication procedure for the PIN-code used to connect a new device. This flaw can be exploited by an attackerto perform a brute force attack to identify the code. This report presentsmethods to counteract brute force attacks performed against the WPS-protocol. The study has been performed by practical experiments where thecountermeasures have been evaluated and their performance has beenmeasured. With simple means, such as a third party acting on the routersbehalf in implementing countermeasures against the attacker, the attack canbe counteracted. The conclusion is that the most effective way of countering the WPS-bruteforce attack presented is to automatically replace the PIN-code with arandomly generated one when an attack is detected.
Dondyk, Erich. "Denial of convenience attack to smartphones using a fake wi-fi access point". Honors in the Major Thesis, University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/544.
Texto completoB.S.P.E.
Bachelors
Engineering and Computer Science
Computer Engineering
Horne, Liliana R. "Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach". Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1064.
Texto completoXin, Liangxiao. "Cascading attacks in Wi-Fi networks: demonstration and counter-measures". Thesis, 2018. https://hdl.handle.net/2144/32678.
Texto completoHsu, An-Ti y 許安迪. "The Research on Wi-Fi Positioning Spoofing Attacks and Authentication Protocols". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/s65ahr.
Texto completo樹德科技大學
資訊工程系碩士班
104
Mobile phone technology is developing rapidly and it has many features to meet different needs. However, in the early stage no consideration to security mechanisms become obvious vulnerability. Wi-Fi positioning produced a problem. Wi-Fi positioning is based on the Media Access Control Address (MAC address) of the Access Point (AP), which can reduce positioning times and improve accuracy. However, the mobile phone apps can easily retrieve the MAC address of the AP and on the internet can also easily search public Wi-Fi AP''s MAC address map. it will be easier to collect by attacker, and Wi-Fi positioning is no authentication protocol to make spoofing attacks easily successful and easily forged real location. In this paper, we propose a combination of cryptographic systems and additional DD-WRT firmware AP, and named Authentication Protocol of Prevent Wi-Fi Positioning Spoofing Attacks. Since the MAC address with the authentication process, the server will be able to authentication the data that an attacker cannot use the collected MAC address to spoofing attacks. In this paper, we propose a Authentication protocol, it is combination of cryptographic systems and Wi-Fi AP equipped with DD-WRT firmware, Authentication protocol to Prevent Wi-Fi positioning spoofing attack, The Authentication protocol have three phase: 1. Registration Phase, 2. Examination Phase, 3. Positioning Authentication Phase, In Registration Phase, Mainly to be able to make Wi-Fi AP to Wi-Fi positioning system server to register their identity, Wi-Fi AP to generate a key, and the key to the Wi-Fi Positioning System server storage, the formation of symmetric key encryption method in the next authentication protocol requires authentication identity, Wi-Fi AP can use the key Response Wi-Fi positioning system server Challenge; In Examination Phase, because Wi-Fi AP did not pass examination, it is not using on the Wi-Fi positioning services. Pass Examination phase method is the use of counting, allowing users to agree to Wi-Fi positioning system server authority to collect information, The information collected is anonymous, Each a collection of information, the count will increase, When the count number reaches the threshold, Wi-Fi AP will pass Examination phase, The Wi-Fi AP information can be used for Wi-Fi positioning system server database, it can be used in Wi-Fi positioning services, In Positioning Authentication Phase, Mainly in the Wi-Fi Positioning, Wi-Fi positioning system server can authenticate the identity of the Wi-Fi AP, When the Wi-Fi AP can be authenticated identity, prevent spoofing attacks will become simple, The forged Wi-Fi AP or MAC address spoofing attacks will become difficult; Because Wi-Fi AP has a key, identity and MAC address can be authenticated, Wi-Fi positioning system server can be certified Wi-Fi AP or MAC address authenticity, Make forged Wi-Fi AP cannot using collected "MAC address" to spoofing attacks. However, when the Wi-Fi AP are moved (e.g. Kaohsiung to Taipei), Authentication protocol will have the possibility of authentication error. Thus, the authentication protocol will be improved. In improved authentication protocol, we let the user’s application provide more information. To confirm Wi-Fi AP exact location, authentication protocol will become more complete.
Libros sobre el tema "Wi-Fi attacks"
Mastering Network Security: Protect Your Network Against Advanced Threats, Wi-Fi Attacks, Exploits, and Trackers. Packt Publishing, Limited, 2020.
Buscar texto completoCapítulos de libros sobre el tema "Wi-Fi attacks"
Noubir, Guevara y Triet D. Vo-Huu. "DoS Attacks in Wi-Fi Networks". En Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1445-1.
Texto completoLee, Il-Gu, Hyunwoo Choi, Yongdae Kim, Seungwon Shin y Myungchul Kim. "Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks". En Research in Attacks, Intrusions and Defenses, 362–83. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11379-1_18.
Texto completoVondráček, Martin, Jan Pluskal y Ondřej Ryšavý. "Automation of MitM Attack on Wi-Fi Networks". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 207–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73697-6_16.
Texto completoSong, Jin-Young y Dea-Woo Park. "A Study on Wi-Fi Hacking Attack Using Web". En Convergence and Hybrid Information Technology, 464–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24082-9_57.
Texto completoSharma, Kavita y B. B. Gupta. "Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges". En Advances in Intelligent Systems and Computing, 555–61. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_56.
Texto completo"Wireless Hacking". En Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 244–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.
Texto completoSharma, Kavita y B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices". En Research Anthology on Combating Denial-of-Service Attacks, 415–34. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch022.
Texto completoKumar, Vinoth, V. R. Niveditha, V. Muthukumaran, S. Satheesh Kumar, Samyukta D. Kumta y Murugesan R. "A Quantum Technology-Based LiFi Security Using Quantum Key Distribution". En Handbook of Research on Innovations and Applications of AI, IoT, and Cognitive Technologies, 104–16. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6870-5.ch007.
Texto completoMugavero, Roberto, Stanislav Abaimov, Federico Benolli y Valentina Sabato. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)". En Cyber Warfare and Terrorism, 931–63. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch056.
Texto completoThiyagarajan, Kirubadevi, Ramamoorthy S, Neelavathy Pari S y Rajakumar P S. "Device Authentication and Secure Routing in MANET for Internet of Things". En Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200159.
Texto completoActas de conferencias sobre el tema "Wi-Fi attacks"
"SURVEYING WI-FI SECURITY - Presentation of Wi-Fi Security Measures, Varius Wi-Fi Attacks and a Classification Survey of Wi-Fi Networks in Thessaloniki". En International Conference on Wireless Information Networks and Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0002027900960101.
Texto completoVanhoef, Mathy y Frank Piessens. "Advanced Wi-Fi attacks using commodity hardware". En the 30th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2664243.2664260.
Texto completoAmoordon, Andy, Christophe Gransart y Virginie Deniau. "Characterizing Wi-Fi Man-In-the-Middle Attacks". En 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS). IEEE, 2020. http://dx.doi.org/10.23919/ursigass49373.2020.9232270.
Texto completoKhasanova, Adelya M. "Detection of Attacks on Wi-Fi Access Points". En 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus). IEEE, 2021. http://dx.doi.org/10.1109/elconrus51938.2021.9396420.
Texto completoCanh Vu, Van y Tuan-Hao Hoang. "Detect Wi-Fi Network Attacks Using Parallel Genetic Programming". En 2018 10th International Conference on Knowledge and Systems Engineering (KSE). IEEE, 2018. http://dx.doi.org/10.1109/kse.2018.8573378.
Texto completoXin, Liangxiao, David Starobinski y Guevara Noubir. "Cascading denial of service attacks on Wi-Fi networks". En 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860474.
Texto completoXin, Liangxiao y David Starobinski. "Cascading Attacks on Wi-Fi Networks with Weak Interferers". En MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242102.3242142.
Texto completoLounis, Karim y Mohammad Zulkernine. "Exploiting Race Condition for Wi-Fi Denial of Service Attacks". En SIN 2020: 13th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433174.3433584.
Texto completoCominelli, Marco, Francesco Gringoli y Renato Lo Cigno. "Non Intrusive Wi-Fi CSI Obfuscation Against Active Localization Attacks". En 2021 16th Annual Conference on Wireless On-demand Network Systems and Services Conference (WONS). IEEE, 2021. http://dx.doi.org/10.23919/wons51326.2021.9415586.
Texto completoVanhoef, Mathy y Frank Piessens. "Denial of Service Attacks Against the 4-Way Wi-Fi Handshake". En 9th International Conference on Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71508.
Texto completo