Survey on WiFi infrastructure attacks Online publication date: Tue, 02-Apr-2019
by Rui Guo
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 16, No. 2, 2019
Abstract: This article describes WiFi hacking techniques that attackers have used, and suggests various defensive measures. WiFi AP passively listens for so-called "beacon", it is completely unencrypted. This makes WiFi easy to use because you can see networks and their names around you without exchanging some key or password first, but it also makes WiFi networks prone to many kinds of attacks. This article also describes the top three exploit kits used as Rogue AP, ARP spoofing, WiFi MITM. These are described as "automated cyber weapons" that are causing havoc by penetrating and bypassing protections in place. It also shows how easy it is to forge disassociation and deauth packet. It's less secure than wired connections because an intruder does not need a physical connection. It also explains man-in-the-middle attacks, Rogue AP, and race conditions attacks, in wireless networks, and gives a list of selected open-source tools. At last it summarises the article with several recommendations that will help improve security in a wireless infrastructure.
Online publication date: Tue, 02-Apr-2019
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org