Security and privacy in an IT context a low-cost WIDS employed against MITM attacks (concept)

被引:0
|
作者
Poljak, N. [1 ]
Sevo, M. [1 ]
Livaja, I. [1 ]
机构
[1] Veleuciliste Sibeniku Odjel Menadzmenta, Trg Andrije Hebranga 11, Shibenik 22000, Hrvatska, Croatia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Contemporary rates of WiFi (802.11) adoption have turned the technology into an oft underestimated source of potential security breaches. Even though the lay user base typically feels protected by employing basic encryption (first WEP, then WPA and currently WPA2), the truth is that it is trivially easy to perform a multitude of attacks on typical home and small business setups. This paper will cover the danger of a MITM') attack as well as fairly straightforward steps one might take to prevent such intrusions by implementing a basic WIDS2 setup with off-the-shelf hardware and open source software.
引用
收藏
页码:1614 / 1617
页数:4
相关论文
共 50 条
  • [31] Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks
    Junfeng Tian
    Zilong Wang
    Zhen Li
    EURASIP Journal on Information Security, 2020
  • [32] Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks
    Tian, Junfeng
    Wang, Zilong
    Li, Zhen
    EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
  • [33] Practical security and privacy attacks against biometric hashing using sparse recovery
    Berkay Topcu
    Cagatay Karabat
    Matin Azadmanesh
    Hakan Erdogan
    EURASIP Journal on Advances in Signal Processing, 2016
  • [34] Practical security and privacy attacks against biometric hashing using sparse recovery
    Topcu, Berkay
    Karabat, Cagatay
    Azadmanesh, Matin
    Erdogan, Hakan
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2016, : 1 - 20
  • [35] On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks
    Chaturvedi, Bhuvnesh
    Chakraborty, Anirban
    Chatterje, Ayantika
    Mukhopadhya, Debdeep
    CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024, 2025, 14906 : 96 - 117
  • [36] Spoofing Attacks on FMCW Radars with Low-Cost Backscatter Tags
    Lazaro, Antonio
    Porcel, Arnau
    Lazaro, Marc
    Villarino, Ramon
    Girbau, David
    SENSORS, 2022, 22 (06)
  • [37] Enhanced low-cost RFID protocol to detect relay attacks
    Munilla, Jorge
    Peinado, Alberto
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (03): : 361 - 371
  • [38] A Low-cost RFID Authentication Protocol with Location Privacy Protection
    Chen, Yu-Yi
    Lu, Jun-Chao
    Chen, Shin-, I
    Jan, Jinn-Ke
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 109 - +
  • [39] A compact, low-cost, passive MMW security scanner
    Williams, TD
    Vaidya, NM
    Passive Millimeter-Wave Imaging Technology VIII, 2005, 5789 : 109 - 116
  • [40] Low-cost 3D security camera
    Bock, Robert D.
    AUTONOMOUS SYSTEMS: SENSORS, VEHICLES, SECURITY, AND THE INTERNET OF EVERYTHING, 2018, 10643