2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science 2020
DOI: 10.23919/ursigass49373.2020.9232270
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Wi-Fi Man-In-the-Middle Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…We want to differentiate our work by adopting a holistic approach to detect the attacks. Jamming attacks can be combined with a fake access point attack to increase the latter's effectiveness [1]. Deauthentication attacks [1] have a similar effect on fake access point attacks.…”
Section: Limitations and Future Workmentioning
confidence: 99%
See 4 more Smart Citations
“…We want to differentiate our work by adopting a holistic approach to detect the attacks. Jamming attacks can be combined with a fake access point attack to increase the latter's effectiveness [1]. Deauthentication attacks [1] have a similar effect on fake access point attacks.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Jamming attacks can be combined with a fake access point attack to increase the latter's effectiveness [1]. Deauthentication attacks [1] have a similar effect on fake access point attacks. We would like to have a single Network Intrusion Detection System that can detect the three attacks when they are perpetrated independently and simultaneously.…”
Section: Limitations and Future Workmentioning
confidence: 99%
See 3 more Smart Citations