Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Wireless LAN location-sensing for security applications
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Wireless hotspots: current challenges and future directions
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Autonomic 802.11 Wireless LAN Security Auditing
IEEE Security and Privacy
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
802.11 network intrusion detection using genetic programming
GECCO '05 Proceedings of the 7th annual workshop on Genetic and evolutionary computation
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
10 Networking Papers: readings for protocol design
ACM SIGCOMM Computer Communication Review
Wireless hotspots: current challenges and future directions
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Secure authentication system for public WLAN roaming
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A wireless intrusion detection method based on neural network
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
Assessing denial of service vulnerabilities in DOCSIS
Proceedings of the 44th annual Southeast regional conference
Incentive compatible medium access control in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
A station strategy to deter backoff attacks in IEEE 802.11 LANs
Journal of Discrete Algorithms
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Security and Privacy
Understanding and mitigating the impact of RF interference on 802.11 networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
EURASIP Journal on Wireless Communications and Networking
Regional-based authentication against dos attacks in wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
IEEE 802.11 wireless network simulator using Verilog
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
Wireless and physical security via embedded sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Anti-jamming timing channels for wireless networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Modelling and analysis of bandwidth competition in 802.11 wireless networks
International Journal of Mobile Network Design and Innovation
Access points vulnerabilities to DoS attacks in 802.11 networks
Wireless Networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Defending wireless sensor networks from radio interference through channel adaptation
ACM Transactions on Sensor Networks (TOSN)
Extending orchids for intrusion detection in 802.11 wireless networks
NOTERE '08 Proceedings of the 8th international conference on New technologies in distributed systems
WSEAS TRANSACTIONS on COMMUNICATIONS
802.11 disassociation DoS attack simulation using Verilog
WSEAS TRANSACTIONS on COMMUNICATIONS
Link-layer protection in 802.11i WLANS with dummy authentication
Proceedings of the second ACM conference on Wireless network security
Security vulnerabilities in IEEE 802.22
Proceedings of the 4th Annual International Conference on Wireless Internet
Denial of service vulnerabilities in the 802.16 protocol
Proceedings of the 4th Annual International Conference on Wireless Internet
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
Fragility of the Robust Security Network: 802.11 Denial of Service
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Prevention of management frame attacks on 802.11 WLANs
International Journal of Wireless and Mobile Computing
Fast track article: Bringing law and order to IEEE 802.11 networks-A case for DiscoSec
Pervasive and Mobile Computing
Capacity and fairness of an ad hoc IEEE 802.11 cell with sophisticated noncooperative stations
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Detecting spoofing attacks in mobile wireless environments
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks
Computers and Electrical Engineering
Capacity-fairness performance of an ad hoc IEEE 802.11 WLAN with noncooperative stations
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
Defence against 802.11 dos attacks using artificial immune system
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
An analysis of mobile WiMAX security: vulnerabilities and solutions
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
On RSN-oriented wireless intrusion detection
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Refocusing in 802.11 wireless measurement
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Detecting identity spoofs in IEEE 802.11e wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Performance sensitivities of wireless mesh networks under path-based DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An effective strategy for greedy behavior in wireless ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A fuzzy logic based scheme to detect adaptive cheaters in wireless lan
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
ANonce encryption in 802.11i 4-way handshake protocol
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
IEEE 802.11 wireless LAN control frame protection
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
Mobile Networks and Applications
Distributed jammer network: impact and characterization
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Intelligent jamming in wireless networks with applications to 802.11b and other networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Novel approaches to enhance mobile WiMAX security
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
IEEE/ACM Transactions on Networking (TON)
WLAN security performance study
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Journal of Computer Systems, Networks, and Communications
Short paper: security evaluation of IEEE 802.11w specification
Proceedings of the fourth ACM conference on Wireless network security
Finding protocol manipulation attacks
Proceedings of the ACM SIGCOMM 2011 conference
WiFiHop - mitigating the Evil twin attack through multi-hop detection
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
The modeling and comparison of wireless network denial of service attacks
MobiHeld '11 Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds
Counteracting DDoS attacks in WLAN
Proceedings of the 4th international conference on Security of information and networks
WAR: wireless anonymous routing
Proceedings of the 11th international conference on Security Protocols
802.11 de-authentication attack detection using genetic programming
EuroGP'06 Proceedings of the 9th European conference on Genetic Programming
A sophisticated solution for revealing attacks on wireless LAN
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Authentication – based medium access control to prevent protocol jamming: A-MAC
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Lightweight wireless intrusion detection systems against DDoS attack
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Joining the Dots: Joining the dots
Network Security
In VANETs we trust?: characterizing RF jamming in vehicular networks
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
International Journal of Communication Systems
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Proceedings of the 18th annual international conference on Mobile computing and networking
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Practical verification of WPA-TKIP vulnerabilities
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
Hi-index | 0.00 |
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumption of confidentiality and availability. While the security flaws in 802.11's basic confidentially mechanisms have been widely publicized, the threats to network availability are far less widely appreciated. In fact, it has been suggested that 802.11 is highly susceptible to malicious denial-of-service (DoS) attacks targeting its management and media access protocols. This paper provides an experimental analysis of such 802.11-specific attacks - their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities.