Welcome to Open Science
Contact Us
Home Books Journals Submission Open Science Join Us News
Wireless Security Issues, Vulnerabilities and Attacks
Current Issue
Volume 3, 2016
Issue 2 (March)
Pages: 6-13   |   Vol. 3, No. 2, March 2016   |   Follow on         
Paper in PDF Downloads: 263   Since May 18, 2016 Views: 2332   Since May 18, 2016
Authors
[1]
Ahamed Dubian Aljuhani, Department of Computing & Information Systems, University of Tabuk, Tabuk, Saudi Arabia.
Abstract
Wireless technologies are widely used around the world; organizations and many more institutions are shifting to wireless technologies. Due to flexibility and portability, wireless technologies spread very quickly. It disseminates also in various electronic devices such as: smart phones and tablets. Wireless communications are available in common places like schools, airports, libraries and more other places, which enables users to connect to the Internet. While wireless technologies are widely used, their security becomes a major concern. In order to make communications secured against attackers, we need to define the security issues in wireless technologies and working to solve them. In this paper we will elaborate various security issues in wireless networking. Also, we will show different techniques of attacks and how to face them. Furthermore, this paper shows diverse threats and techniques at OSI model.
Keywords
Wireless Security, Wireless Issues, Wireless Vulnerabilities, Wi-Fi, Public Wi-Fi Access, OSI Layer attacks, Wi-Fi Threats
Reference
[1]
Yulong. Zou, Xianbin. Wang, and Lajos. Hanzo, “A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends,” PROCEEDINGS OF THE IEEE, May 2015.
[2]
Stallings, W. (2011). Network security essentials: Applications and standard (4ed). Pearson education inc. Paper, 432 pp.
[3]
D. Ma and G. Tsudik, “Security and privacy in emerging wireless networks,” IEEE Wireless Communications, vol. 17, no. 5, pp. 12-21, October 2010.
[4]
H. Kumar, D. Sarma, and A. Kar, “Security threats in wireless sensor networks,” IEEE Aerospace and Electronic Systems Magazine, vol. 23, no. 6, pp. 39-45, June 2008.
[5]
Y. Shiu, et al., “Physical layer security in wireless networks: A tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66-74, Apirl 2011.
[6]
A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no. 10, pp. 54-62, October 2002.
[7]
H. Huang, N. Ahmed, P. Karthik, “On a new type of denial of service attack in wireless networks: The distributed jammer network,” IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 2316- 2324, July 2011
[8]
B. Haibo, L. Sohraby, and C. Wang, “Future internet services and applications,” IEEE Network, vol. 24, no. 4, pp. 4-5, April 2010.
[9]
“Physical Layer” Techo pedia. Retrieved from https://goo.gl/08md9z
[10]
A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” Communications of The ACM, vol. 47, no. 6, pp. 53-57, June 2004.
[11]
G. Noubir and G. Lin, “Poster: Low-Power DoS Attacks in Data Wireless LANs and Countermeasures”, in MobiHoc 03, June 1-3,
[12]
G. Lin and G. Noubir, “On Link Layer Denial of Service in Data Wireless LANs”, in Wireless Communications and Mobile Computing, May 2003.
[13]
Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy University of California, Riverside: http://alumni.cs.ucr.edu/~kpele/COMST-preprint.pdf
[14]
“Network Layer Definition” The Linux Information Project. Retrieved from http://www.linfo.org/network_layer.html
[15]
Computer Emergency Response Team (CERT), “CERT advisory: IP spoofing attacks and hijacked terminal connections,” January 1995, available on-line at http://www.cert.org/advisories/CA-1995-01.html.
[16]
AMALA. GRACY1 and CHINNAPPAN. JAYAKUMAR2, “Identifying and locating multiple spoofing attackers using clustering in wireless network,” International Journal of Wireless Communications and Mobile Computing 2013; 1(4): 82-90 Published online September 30, 2013.
[17]
B. Harrisa and R. Hunt, “TCP/IP security threats and attack methods,” Computer Communications, vol. 22, no. 10, pp. 885-897, June 1999.
[18]
F. El-Moussa, N. Linge, and M. Hope, “Active router approach to defeating denial-of-service attacks in networks,” IET Communications, vol. 1, no. 1, pp. 55-63, February 2007.
[19]
N. Hastings and P. McLean, “TCP/IP spoofing fundamentals,” Pro- ceedings of The 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications, Arizona, USA, March 1996.
[20]
C. Schuba, et al., “Analysis of a denial of service attack on TCP,” Proceedings of The 1997 IEEE Symposium on Security and Privacy, Oakland, USA, May 1997.
[21]
A. Kuzmanovic and E. W. Knightly, “Low-rate TCP-targeted denial of service attacks and counter strategies,” IEEE/ACM Transactions on Networking, vol. 14, no. 4, pp. 683-696, August 2006.
[22]
A. Himanshu, “TCP Attacks: TCP Sequence Number Prediction and TCP Reset Attacks,” The Geek Stuff. January 2012.
[23]
R. Chang, “Defending against flooding-based distributed denial-of- service attacks: A tutorial,” IEEE Communications Magazine, vol. 40, no. 10, pp. 42-51, October 2002.
[24]
“UDP Flood,” Imperva Incapsula. Retrieved from https://www.incapsula.com/ddos/attack-glossary/udp-flood.html
[25]
“Applying the OSI Seven Layer Network Model To Information Security,” November 21, 2003. the SANS Institute Reading Room site. Retrieved from https://goo.gl/FjMbf7
[26]
RFC 2577, “FTP security considerations,” May 1999, available on-line at http://tools.ietf.org/html/rfc2577
[27]
T. Bass, A. Freyre, D. Gruber, and G. Watt, “E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity,” IEEE Network, vol. 12, no. 2, pp. 10-17, March 1998.
[28]
A. Kieyzun, P. Guo, K. Jayaraman, and M. Ernst, “Automatic creation of SQL injection and cross-site scripting attacks,” Proceedings of The IEEE 31st International Conference on Software Engineering, Vancouver, Canada, May 2009.
[29]
Monica. Paolini, “Wireless security in LTE networks,” White paper Wireless security in LTE networks. 2012. Retrieved from http://goo.gl/uUgWZq
[30]
“The Mailman Inside Our Computers. Or: What Is Simple Mail Transfer Protocol?,” What Is My Ip Address. Retrieved from http://whatismyipaddress.com/smtp
[31]
b. zhou, a. marshall and Tsung. Hang lee, “Wireless Security Issues Pervasive Computing,” Fourth International Conference on Genetic and Evolutionary Computing. 2010.
[32]
“What is WiFi and How Does it Work?” CCM. Retrieved from http://goo.gl/LPWDEA
[33]
Lehembre. Guillaume, “Wi-Fi security – WEP, WPA and WPA2,” Retrieved from http://goo.gl/FC8nuz. June 2005.
[34]
V. Shivaputrappa, “IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability,” Retrieved from http://goo.gl/N6ny9R. Spring 2005.
[35]
lucaskauffman, “WiFi security: history of insecurities in WEP, WPA and WPA2,” IT Security Community Blog. Retrieved from http://goo.gl/rAkQAB. September 2013.
[36]
P. Vipin, “A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2),” International Journal on AdHoc Networking Systems (IJANS) Vol. 4, No. 3, July 2014
[37]
C. Holly, “Wi-Fi Protected Access (WPA) Security and Exploits,” March 2006.
[38]
S. Pouyan, S. Petr, V. Serge, and V. Martin, “Tornado Attack on RC4 with Applications to WEP & WPA,” Published at Eurocrypt 2011 [66]. Retrieved from https://goo.gl/AzVzdU.
[39]
A. Paul, “Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2),” INFS 612 – Fall 2006. Retrieved from http://goo.gl/5W5qEU.
[40]
Frank H. Katz, “WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?,” Armstrong Atlantic State University.
[41]
C. Ajay, “WPA2 Exposed with 'Hole 196' Vulnerability,” Info Security. Jul 2010. Retrieved from http://goo.gl/sbC1c1
[42]
“The Hidden Dangers of Public WiFi” Private WiFi. October 2014. Retrieved from http://goo.gl/on46nO.
[43]
“How to Avoid Public WiFi Security Risks” Kasper Sky. Retrieved from http://goo.gl/5aLTrV.
[44]
A. Ahamed, Cyber Security Threats and Suggestions to Protect Their Attack. American Journal of Computer Science and Engineering. Vol. 3, No. 1, 2016, pp. 1-5.
Open Science Scholarly Journals
Open Science is a peer-reviewed platform, the journals of which cover a wide range of academic disciplines and serve the world's research and scholarly communities. Upon acceptance, Open Science Journals will be immediately and permanently free for everyone to read and download.
CONTACT US
Office Address:
228 Park Ave., S#45956, New York, NY 10003
Phone: +(001)(347)535 0661
E-mail:
LET'S GET IN TOUCH
Name
E-mail
Subject
Message
SEND MASSAGE
Copyright © 2013-, Open Science Publishers - All Rights Reserved