B Pradeepkumar, K Talukdar… - … on Advances in …, 2017 - ieeexplore.ieee.org
With the widespread use of Wireless Local Area Network (WLAN) s Rogue Access Point (AP) s have become a severe security threat to the WLAN user. In a recent survey, Gartner …
In this paper, we first show that Group Owner (GO) devices in Wi-Fi Direct are vulnerable to the EvilDirect attack. In the EvilDirect attack, a rogue GO is set up by an adversary to look …
Nowadays wireless communications are ubiquitous and getting over requested. It has become a demand in modern days life; people have to be connected always and …
K Sawicki, ZM Piotrowski - Elektronika-konstrukcje, technologie …, 2017 - repo.bg.wat.edu.pl
The article presents a complex system of two-way authentication operating in IEEE 802.11 wireless networks and making use of the network steganography methods. System …