Optimized de-authentication attack in ieee 802.11 networks

ISSN: 22773878
0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

Abstract

Wireless attacks, of late, have become the foremost threat in the field of Wi-Fi technology. This is mainly attributed to the lack of easy and affordable monitoring systems that can recognize behaviors of patterns in different attacks. MAC layer vulnerabilities are main reasons for the significant number of DDoS/DoS attacks in Wi-F access points. During the implementation of De-authentication attack, an attacker transmits a bulk of spoofed De-authenticated frames to the legitimate clients/users, which result in the disconnection from the Wi-Fi access point to which they are connected. Existing techniques of De-authentication-DoS attack rely on the encryption algorithm and protocol modifications. Nevertheless, this paper mainly focuses on the implementation of De-authentication attack in a smart way by localizing the client movement in Wi-Fi networks. In particular, we present a new attack and its experimental set up, and demonstrate its De-authentication.

Cite

CITATION STYLE

APA

Mani Chandra, G., Raghava Rao, K., & Prasad V, P. (2019). Optimized de-authentication attack in ieee 802.11 networks. International Journal of Recent Technology and Engineering, 7(6), 788–793.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free