2020
DOI: 10.21512/commit.v14i1.6337
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test

Abstract: The research aims to know the level of security of WiFi connectivity against deauthentication attacks on Internet of Things (IoT)-based devices. It is done through testing using an external penetration test method. The external penetration test simulates a real external attack without information about the target system and network given. The process starts from accessing the device through Internet or WiFi by the test target. At the same time, the attacker performs Denial-of-Service (DoS) attacks onWiFi. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
13
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 6 publications
0
13
0
1
Order By: Relevance
“…A type of management frames called the deauthentication frame is used to instruct a station to drop its network connection [ 40 ]. Usually, the station will automatically attempt to reconnect, which initiates a new handshake process.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A type of management frames called the deauthentication frame is used to instruct a station to drop its network connection [ 40 ]. Usually, the station will automatically attempt to reconnect, which initiates a new handshake process.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This constitutes a serious concern because in the IEEE 802.11i standard, which WPA2 is based on, the stations do not authenticate or encrypt management and control frames [ 35 ]. The frames are sent in plain-text, meaning that an adversary can forge a deauthentication frame that appears to be from an AP in order to kill the connection to a client [ 40 ]. The adversary can then capture the handshake process upon reconnection or continue to send the deauthentication frames.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A scenario is created and simulated for a deauthentication attack on a device with WiFi connectivity. The goal of the attack is to record all activities when the attack occurs using tools [21].…”
Section: Cyber Attacks Against Medical Devicesmentioning
confidence: 99%
“…In [15], the authors researched and implemented a sce nario of a deauthentication attack, during which a legitimate client was disconnected from the AP, which made any data transfer impossible.…”
mentioning
confidence: 99%