A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

被引:0
|
作者
Singh, Niraj Kumar [1 ]
Sridaran, R. [1 ]
机构
[1] Marwadi Univ, Rajkot, Gujarat, India
关键词
phishing attack; spoofing; sniffing; malicious network; wireless sensor networks; social engineering;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The evolvement of mobile electronic devices and gadgets has resulted in the demand for Wireless network. Creating fake authentication web-portal identical of targeted network and wireless network of the same SSID leads to spoofing of emails and passphrases causing loss of all private and confidential messages and data. The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID (Basic service set identifier), frequency and a channel, which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly as well as send an alert message to all the users to avoid such a wireless network to protect themselves from being hacked.
引用
收藏
页码:1212 / 1217
页数:6
相关论文
共 50 条
  • [31] A Survey on Proficient Techniques to Mitigate Clone Attack in Wireless Sensor Networks
    Grewal, Rubal
    Kaur, Jasleen
    Saini, Kamaljit Singh
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1148 - 1152
  • [32] Mitigate the Side Channel Attack Using Random Generation with Reconfigurable Architecture
    Kumar, A. E. Sathis
    Illuri, Babu
    INTELLIGENT COMPUTING AND NETWORKING, IC-ICN 2021, 2022, 301 : 111 - 123
  • [33] Battery Draining Attack and Defense against Power Saving Wireless LAN Devices
    Lee, Il-Gu
    Go, Kyungmin
    Lee, Jung Hoon
    SENSORS, 2020, 20 (07)
  • [34] A secure routing scheme to mitigate attack in wireless adhoc sensor network
    Sajan, Isaac R.
    Jasper, J.
    COMPUTERS & SECURITY, 2021, 103
  • [35] Network Analysis of ICMP Ping Flood DoS Attack in WiMAX and Wireless LAN
    Raheja, Anu
    Singh, Ajit
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 109 - 117
  • [36] A Novel Wireless LAN Protocol for Factory Automation Control
    Lam, D. K.
    Urabe, H.
    Shinozaki, Y.
    Yamaguchi, K.
    Morita, S.
    Nagao, Y.
    Kurosaki, M.
    Ochi, H.
    2014 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS IEEE-ROBIO 2014, 2014, : 1248 - 1253
  • [37] WireLan:: A broadband wireless IR LAN architecture compatible with the ethernet protocol
    Jungnickel, V
    von Helmolt, C
    Krüger, U
    24TH EUROPEAN CONFERENCE ON OPTICAL COMMUNICATION, VOL 1-3: VOL 1: REGULAR AND INVITED PAPERS; VOL 2: TUTORIALS AND SYMPOSIUM PAPERS; VOL 3: POSTDEADLINE PAPERS, 1998, : 367 - 368
  • [38] Efficient automatic gain control algorithm and architecture for wireless LAN receivers
    Lee, Il-Gu
    Lee, Sok-Kyu
    JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (07) : 379 - 385
  • [39] Peer-to-peer wireless LAN consortia: Economic modeling and architecture
    Antoniadis, P
    Courcoubetis, C
    Efstathiou, EC
    Polyzos, GC
    Strulo, B
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 198 - 199
  • [40] A novel low power pipelined FFT based on subexpression sharing for wireless LAN applications
    Han, W
    Arslan, T
    Erdogan, AT
    Hasan, M
    2004 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS DESIGN AND IMPLEMENTATION, PROCEEDINGS, 2004, : 83 - 88