Exploitations of wireless interfaces via network scanning
暂无分享,去创建一个
In brainstorming for ways to exploit Internet of Things (IoT) security, we envisioned the following premise: an attack which compromises the security of multiple wireless interfaces. In this project, we attempt to reveal information about a region of networks; this data includes each network's location, security, signal strength, and user activity. In exposing such data, we hope to shed light on the security problems associated with wireless networks.
[1] Tai-hoon Kim,et al. Wireless Network Security: Vulnerabilities, Threats and Countermeasures , 2008 .
[2] H. Boland,et al. Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[3] Halil-Ibrahim Bulbul,et al. Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols , 2008, e-Forensics '08.