Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

SU Ullas, J Sandeep - Advances in Big Data and Cloud Computing …, 2019 - Springer
Ubiquitous computing is a new paradigm in the world of information technology. Security
plays a vital role in such networking environments. However, there are various methods …

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11 e-based Access Point

M Bogdanoski, P Latkoski, A Risteski - Mobile Networks and Applications, 2017 - Springer
This paper analyzes several Denial of Service (DoS) attacks at Medium Access Control
(MAC) level, with an emphasis on the attacks related to authentication and association …

A challenge-based countermeasure against the spoofed PS-Poll-based DoS attack in IEEE 802.11 networks

H Souilah, A Baadache… - … Journal of Critical …, 2019 - inderscienceonline.com
802.11 network is an emerging wireless broadband technology used to connect client
stations to the network via an access point (AP). This network is particularly vulnerable to …

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE. 11e-Based Access Point

M Bogdanoski, P Latkoski… - Mobile Networks and …, 2016 - eprints.ugd.edu.mk
This paper analyzes several Denial of Service (DoS) attacks at Medium Access Control
(MAC) level, with an emphasis on the attacks related to authentication and association …