Abstract | ||
---|---|---|
802.11b networks can not be relied upon as part of the critical infrastructure of organisational networks. Recently released tools and exploits attack weaknesses in the 802.11 protocol rendering these types of network highly insecure and vulnerable to a variety of attacks. The authors experimented with newer 802.11b attack tools (principally AirJack) that use specialist drivers to manipulate layers 1 and 2 of the OSI Network model. The experiment saw successful disassociation and de-authentication attacks against 802.11b wireless networks. These attacks nullify many extra countermeasures that organisations will have put in place to defeat existing 802.11 protocol weaknesses such as WEP weaknesses. The ability to procure wireless network services for malicious use or simple theft with little chance of direct detection is now even more of a security issue. |
Year | Venue | Keywords |
---|---|---|
2004 | SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT | exploit,session hijack,insecure,wireless |
Field | DocType | Citations |
Fixed wireless,Wireless network,Key distribution in wireless sensor networks,Computer science,Computer network,Wireless WAN,Heterogeneous network,Wi-Fi array,Wireless LAN controller,Base transceiver station | Conference | 2 |
PageRank | References | Authors |
0.83 | 1 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Craig Valli | 1 | 132 | 33.90 |
Peter Wolski | 2 | 2 | 1.17 |