Beacon Spoofing Attack: Impact and Security in Wireless Mesh Networks
Abstract
Keywords
Full Text:
PDFReferences
Stuart Compton, Charles Hornat. 802.11 Denial Of Service Attacks and Mitigation. SANS Institute InfoSec Reading Room, 14-18, May 17th 2007.
John Bellardo and Stefan Savage. Denial of Service Attacks: Real Vulnerabilities and Practical Solutions In the Proceedings of the 12TH USENIX Security Symposium Washington, D.C., U.S.A. Aug 4 -8, 2003.
N. Bisnik and A. Abouzeid, Delay and Throughput in Random Access Wireless Mesh Networks In the Proceedings Of IEEE International Conference on Communications (ICC 2006), vol.1, pp. 403 -408, Jun 2006.
Joshua Wright Detecting wireless LAN MAC Address spoofing, GCIH, CCNA, pp 1-5, Jan 21, 2003.
Asier Martinez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fernandez, Jesus lizarraga, Ainhoa Serna and Inaki Velez. Beacon frame Spoofing Attack Detection in IEEE 802.11 Networks In the proceedings of the third international conference on Availability, Reliability and Security (ARES08), pp 520-522, Barcelona, 4-7th March 2008.
Jon Edney and William A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i, 480 pages, Addison Wesley, 2003, ISBN: 0-321-13620-9
Vikram Gupta, Srikanth Krishnamurthy, and Michalis Faloutsos, “Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks”, Proceedings of 2002 MILCOM Conference, Anaheim, CA, October 2002
Fanglu Guo and Tzi-cker Chiueh. Sequence Number Based MAC Address Spoof Detection in the book named Lecture Notes In Computer Science, pp 315-325, Volume 3858/2006, Springer Link.
Shakeel Ahmad Ghumman, Security in Wireless Mesh Networks , Thesis Report, Halnstead University , Sweden, June 2009.
Josephine Larsson, Ida Waller,Security in Wireless Networks: Vulnerabilities and Countermeasures ,Thesis Report, Blekinge Institute of Technology , Spring 2003.
Vital Mynampati, Dilip Kandula, Raghuram Garimilla, Kalyan Srinivas , Performance and Security of Wireless Mesh Networks, Thesis Report , Blekinge Institute of Technology ,June 2009.
D. Dasgupta, F. Gonzalez, K. Yallapu and M. Kaniganti. Multilevel Monitoring and Detection Systems (MMDS). In the proceedings of the 15th Annual Computer Security Incident Handling Conference (FIRST), Ottawa, Canada June 22-27, 2003.
E. D Cardenas. MAC Spoofing {An Introduction. http://www.giac.org/practical/GSEC/Edgar Cardenas GSEC.pdf
J. Hall, M. Barbeau and E. Kranakis. Using Transceiver Prints for Anomaly Based Intrusion Detection. In Proceedings of 3rd IASTED, CIIT 2004, St. Thomas, US Virgin Islands, USA, November 22-24, 2004.
F. Robinson. 802.11i and WPA up Close. Network Computing, 2004.
Peter Egli, Product Manager Wireless & Networking Technologies,” Susceptibility of wireless devices to denial of service attacks”/http://www.netmodule.com
A. Gerkis and J. Purcell. A Survey of Wireless Mesh Networking Security Technology and Threats. Sans Infosec Reading Room, Sep 2006.
Wireless Mesh Networks /http://www.wikkipedia
White papers “Can Wireless LAN Denial of Service Attacks Be Prevented? “Understanding WLAN Vulnerabilities and their Countermeasures.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.