Current threats of wireless networks

This paper discusses current threats in wireless networks. Advancement and countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering are discussed in this paper. Some practical suggestions for service providers and users to mitigate the risks to the threats are also presented.

[1]  Chao Yang,et al.  Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[2]  Noora Al Mutawa,et al.  Forensics and war-driving on unsecured wireless network , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[3]  S Vinjosh Reddy,et al.  Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.

[4]  Xiaohong Yuan,et al.  Cloud computing and security challenges , 2012, ACM-SE '12.

[5]  Kun Yang,et al.  A Random Packet Destruction DoS Attack for Wireless Networks , 2008, 2008 IEEE International Conference on Communications.

[6]  Adrian Hannah Packet sniffing basics , 2011 .

[7]  Amit Dvir,et al.  A joint framework of passive monitoring system for complex wireless networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[8]  Guangzhi Qu,et al.  RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.

[9]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[10]  Hong Huang,et al.  On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network , 2011, IEEE Transactions on Wireless Communications.

[11]  Li Hui,et al.  Mobile jamming attack in clustering wireless sensor network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[12]  Ajaz Hussain Mir,et al.  Quantification of the Effect of Security on Performance in Wireless LANs , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[13]  Saurabh Dey,et al.  The sneeze algorithm: A social network & biomimetic approach for intrusion detection in wireless networks , 2010, 2010 IEEE International Workshop on: Business Applications of Social Network Analysis (BASNA).

[14]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[15]  Kai Cui,et al.  A research into the latent danger of WLAN , 2011, 2011 6th International Conference on Computer Science & Education (ICCSE).

[16]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[17]  Andrew Vladimirov,et al.  Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) , 2007 .

[18]  Phivos Mylonas,et al.  Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.

[19]  Sanjay Kumar Jena,et al.  Security in Bluetooth, RFID and wireless sensor networks , 2011, ICCCS '11.