WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES

This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.

[1]  Chao Yang,et al.  Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[2]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[3]  Sanjay Kumar Jena,et al.  Security in Bluetooth, RFID and wireless sensor networks , 2011, ICCCS '11.

[4]  Andrew Vladimirov,et al.  Wi-Foo: The Secrets of Wireless Hacking , 2004 .

[5]  Noora Al Mutawa,et al.  Forensics and war-driving on unsecured wireless network , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[6]  Saurabh Dey,et al.  The sneeze algorithm: A social network & biomimetic approach for intrusion detection in wireless networks , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).

[7]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[8]  Hong Huang,et al.  On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.

[9]  Xiaohong Yuan,et al.  Cloud computing and security challenges , 2012, ACM-SE '12.

[10]  Kun Yang,et al.  A Random Packet Destruction DoS Attack for Wireless Networks , 2008, 2008 IEEE International Conference on Communications.

[11]  Kai Cui,et al.  A research into the latent danger of WLAN , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).

[12]  Guangzhi Qu,et al.  RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.

[13]  Radha Gulati The Threat of Social Engineering and Your Defense Against It , 2003 .

[14]  Adrian Hannah Packet sniffing basics , 2011 .

[15]  Amit Dvir,et al.  A joint framework of passive monitoring system for complex wireless networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[16]  Phivos Mylonas,et al.  Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.

[17]  Li Hui,et al.  Mobile jamming attack in clustering wireless sensor network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[18]  Ajaz Hussain Mir,et al.  Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[19]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[20]  S Vinjosh Reddy,et al.  Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.