2014 IEEE Network Operations and Management Symposium (NOMS) 2014
DOI: 10.1109/noms.2014.6838262
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of injection capabilities and media access of IEEE 802.11 hardware in monitor mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…A structural scheme of the development of the application is established where the characteristics of the functionality of the algorithm and the logical design are synthesized, as shown in Figure 2. Initially the methods used in the application are defined, then the console or terminal is used to establish the network card in monitor mode accessible to the user (Günther et al, 2014) in order to capture the control and management frames within the header of the link layer and the resources of the operating system, on which the application is running. Next, the graphic interface is loaded where two programming threads (subprocesses) are started simultaneously, one for data analysis and the other for the capture of the beacos frames.…”
Section: B Design Of the Programming Structurementioning
confidence: 99%
“…A structural scheme of the development of the application is established where the characteristics of the functionality of the algorithm and the logical design are synthesized, as shown in Figure 2. Initially the methods used in the application are defined, then the console or terminal is used to establish the network card in monitor mode accessible to the user (Günther et al, 2014) in order to capture the control and management frames within the header of the link layer and the resources of the operating system, on which the application is running. Next, the graphic interface is loaded where two programming threads (subprocesses) are started simultaneously, one for data analysis and the other for the capture of the beacos frames.…”
Section: B Design Of the Programming Structurementioning
confidence: 99%
“…A Class 10 MicroSD card of 32 GB was used for the storage of collected data. USB Wi-Fi Adapter: The Ralink RT5372 Wireless Chipset Adapter was used as the Wi-Fi adapter for its low cost and operation in monitor mode (Günther et al, 2014), allowing to capture the exchange of information between Wi-Fi devices without connection to a network. This adapter model also allows the adjustment of the power of the signal range and, thus, control over the capture radius.…”
Section: Detec8on Devicementioning
confidence: 99%
“…The time for medium access significantly differs depending on the actual implementation of the medium access and physical layer: while it is in the single-digit microsecond range and rather constant for switched, full-duplex Gigabit Ethernet networks [18], it is orders of magnitude larger in wireless networks due the complex medium access strategy and the shared nature of the medium [19]. If multiple transmitters contend for medium access, both the delay and its standard deviation may well be in the range of milliseconds for individual nodes.…”
Section: Framework For Reproducible Ncs Benchmarkingmentioning
confidence: 99%