[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …

Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[HTML][HTML] A comprehensive attack flow model and security analysis for Wi-Fi and WPA3

CP Kohlios, T Hayajneh - Electronics, 2018 - mdpi.com
The presence of wireless communication grows undeniably more prevalent each year.
Since the introduction of the IEEE 802.11 standard for Wireless Local Area Networks …

[PDF][PDF] Security and performance evaluation of lightweight cryptographic algorithms in RFID

M Alizadeh, M Salleh, M Zamani, J Shayan… - Kos Island …, 2012 - academia.edu
This paper analyzes the security and performance of lightweight encryption algorithms,
which are used in RFID applications. Four of the most popular algorithms which are TEA …

[PDF][PDF] Wireless networks: developments, threats and countermeasures

MM Noor, WH Hassan - … Journal of Digital Information and Wireless …, 2013 - academia.edu
This paper discusses current threats in wireless networks and some academia research
reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man …

Catch me if you can: Rogue access point detection using intentional channel interference

R Jang, J Kang, A Mohaisen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which
can relay back and forth traffic between a legitimate AP and a wireless station, and act as a …

User-side wi-fi evil twin attack detection using ssl/tcp protocols

O Nakhila, E Dondyk, MF Amjad… - 2015 12th Annual IEEE …, 2015 - ieeexplore.ieee.org
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a
legitimate one but actually has been set up to eavesdrop on wireless communications [1] …

User-side wi-fi evil twin attack detection using random wireless channel monitoring

O Nakhila, C Zou - MILCOM 2016-2016 IEEE Military …, 2016 - ieeexplore.ieee.org
Free open wireless Internet access is a complimentary Wi-Fi service offered by most coffee
shops, fast food restaurants and airports to their customers. For ease of access, these Wi-Fi …

Detection of man‐in‐the‐middle attacks using physical layer wireless security techniques

L Wang, AM Wyglinski - Wireless Communications and Mobile …, 2016 - Wiley Online Library
Compared with a wired network, a wireless network is not protected by the cable
transmission medium. Information is broadcasted over the air and it can be intercepted by …