Automation Check Vulnerabilities Of Access Points Based On 802.11 Protocol

被引:0
作者
Subbotin, Danil [1 ]
Babalova, Irina [1 ]
Bazanov, Vadim [1 ]
Ivanov, Nikita [1 ]
机构
[1] Natl Res Nucl Univ, MEPhI Moscow Engn Phys Inst, Dept Comp Syst & Technol, Moscow, Russia
来源
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020) | 2020年
关键词
Wi-Fi; security; vulnerabilities; sustainability; attacks;
D O I
10.1109/AICT50176.2020.9368611
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wi-Fi technology has a huge distribution around the world. There are a large number of devices that in one way or another work with different versions of the 802.11 protocol. However, this technology has a large number of different vulnerabilities. Many of them can be solved in the production of Wi-Fi modules. But not all manufacturers produce modules with fixed vulnerabilities. Therefore, the objective of this article is to create a product that can automatically check the stability of a wi-fi module to DoS attacks.
引用
收藏
页数:5
相关论文
共 22 条
  • [1] Ahmad MS, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P53
  • [2] Dependability in wireless networks - Can we rely on WiFi?
    Aime, Marco Domenico
    Calandriello, Giorgio
    Ljoy, Antonio
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (01) : 23 - 29
  • [3] Joint reactive jammer detection and localization in an enterprise WiFi network
    Cai, Yifeng
    Pelechrinis, Konstantinos
    Wang, Xin
    Krishnamurthy, Prashant
    Mo, Yijun
    [J]. COMPUTER NETWORKS, 2013, 57 (18) : 3799 - 3811
  • [4] Caneill M., ATTACKS WIFI PROTOCO
  • [5] Cocker E, 2013, 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS)
  • [6] Faria D.B., 2002, P 1 ACM WORKSHOP WIR, P47
  • [7] The Password Reset MitM Attack
    Gelernter, Nethanel
    Kalma, Senia
    Magnezi, Bar
    Porcilan, Hen
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 251 - 267
  • [8] Channel Switch and Quiet Attack: New DoS Attacks Exploiting the 802.11 Standard
    Koenings, Bastian
    Schaub, Florian
    Kargl, Frank
    Dietzel, Stefan
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 14 - 21
  • [9] Mehta Manan, 2015, International Journal of Electronics and Communication Engineering & Technology, V6, P7
  • [10] Performance Evaluation of Densely Deployed WLANs using Directional and Omni-Directional Antennas
    Memon, Shuaib K.
    Nisar, Kashif
    Ahmad, Waseem
    [J]. COMPUTATIONAL SCIENCE AND TECHNOLOGY, 2019, 481 : 369 - 378