Title: Survey on WiFi infrastructure attacks

Authors: Rui Guo

Addresses: Department of Internet Crime Investigation, National Police University of China, Liaoning Province, China

Abstract: This article describes WiFi hacking techniques that attackers have used, and suggests various defensive measures. WiFi AP passively listens for so-called "beacon", it is completely unencrypted. This makes WiFi easy to use because you can see networks and their names around you without exchanging some key or password first, but it also makes WiFi networks prone to many kinds of attacks. This article also describes the top three exploit kits used as Rogue AP, ARP spoofing, WiFi MITM. These are described as "automated cyber weapons" that are causing havoc by penetrating and bypassing protections in place. It also shows how easy it is to forge disassociation and deauth packet. It's less secure than wired connections because an intruder does not need a physical connection. It also explains man-in-the-middle attacks, Rogue AP, and race conditions attacks, in wireless networks, and gives a list of selected open-source tools. At last it summarises the article with several recommendations that will help improve security in a wireless infrastructure.

Keywords: genetic algorithm; utility tunnel; explosion overpressure; numerical simulation.

DOI: 10.1504/IJWMC.2019.099026

International Journal of Wireless and Mobile Computing, 2019 Vol.16 No.2, pp.97 - 101

Available online: 02 Apr 2019 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article