2016
DOI: 10.1007/s11036-016-0753-1
|View full text |Cite|
|
Sign up to set email alerts
|

Analysis of the Impact of AuthRF and AssRF Attacks on IEEE 802.11e-based Access Point

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The obtained simulation results for average aggregated system throughput, as well as average multimedia secure access probability values for different 5G and heterogeneous mobile and wireless broadband network conditions (with different security threats per different RATs), are presented furthermore. The jamming and DDoS attacks and the effects of these attacks are simulated in OPNET Modeler environment [40] [47][48][49][50][51][52]. The performance of the proposed ASECQUA framework is evaluated through simulations done in both MATLAB and OPNET.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…The obtained simulation results for average aggregated system throughput, as well as average multimedia secure access probability values for different 5G and heterogeneous mobile and wireless broadband network conditions (with different security threats per different RATs), are presented furthermore. The jamming and DDoS attacks and the effects of these attacks are simulated in OPNET Modeler environment [40] [47][48][49][50][51][52]. The performance of the proposed ASECQUA framework is evaluated through simulations done in both MATLAB and OPNET.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Moreover, it is known that wireless networks are far more vulnerable to cyber-attacks than wired networks. [1]. Due to the susceptible nature of wireless networks, we believe that an automated video surveillance framework would be adversely affected if its associated wireless network was attacked, especially in a stealthy manner.…”
Section: Methodsmentioning
confidence: 99%
“…1. We targeted our system via a Wi-Fi deauthentication attack and an ARP spoofing attack using the Evil Limiter software 1 . By sending deauthentication packets, an attacker can potentially target the communication between clients and routers, which can result in clients experiencing connection outages.…”
Section: Methodsmentioning
confidence: 99%
“…It is possible mainly because of wireless transmission media. It is proven to be far more vulnerable than traditional wired networks [5].…”
Section: Introductionmentioning
confidence: 99%