Taxonomy and future threat of rogue access point for wireless network

KC Patel, A Patel - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
2022 9th International Conference on Computing for Sustainable …, 2022ieeexplore.ieee.org
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow,
limited, and restricted access to the legitimate network. In a simplistic sense and most
common manner, radio frequency (RF) is used for data communication on a network without
wires. By its nature and methodology, wireless communication uses an air interface, and
hence, it is vulnerable to attackers or hackers who can leverage these things and will …
Wireless network communication is an enormous and vast area of research. Many companies and organizations, related to wireless security have struggled due to the narrow, limited, and restricted access to the legitimate network. In a simplistic sense and most common manner, radio frequency (RF) is used for data communication on a network without wires. By its nature and methodology, wireless communication uses an air interface, and hence, it is vulnerable to attackers or hackers who can leverage these things and will compromise the legitimate network, devices, servers, applications, databases, and connected users. Wireless network attacks can be categorised into various types named Distributed Denial of Service (DDoS), Evil-twin, Man-in-the-Middle (MITM), Wireless Fidelity (Wi-Fi) Deauthentication, and Internet of Things (IoT)-based attacks. These types of attacks can compromise and infect the operational technology of large-scale public and private sector organizations' Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA). A wireless rogue access point has already done harmful things to businesses of all sizes, not just coffee shops, airport terminals, tube stations, or public gardens. This paper classifies rogue access points (RAPs) in wireless communication as a serious threat to the Wireless Local Area Network (WLAN) 802.11 protocol. The aim is to classify various types of wireless attacks and their various techniques, which are especially performed through RAP successfully. This paper also presents the statistical data and literature survey based on demand of next generation Wi-Fi enabled technologies and related cyber threats, which show that RAP is a serious threat to legitimate networks for wireless network and communication.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果