Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007) 2007
DOI: 10.1109/secperu.2007.18
|View full text |Cite
|
Sign up to set email alerts
|

Towards effective Wireless Intrusion Detection in IEEE 802.11i

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The major wireless attack categories pertaining to IEEE 802.11 family networks and in particular the latest 802.11i security standard [1].Explained all kinds of the wireless attacks that have been performed on a wireless network in the past. Based on analyzing the drawbacks all attacks are targeted on, improved scheme for wireless network [11].Wireless IDS will be an important part of the WLAN.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The major wireless attack categories pertaining to IEEE 802.11 family networks and in particular the latest 802.11i security standard [1].Explained all kinds of the wireless attacks that have been performed on a wireless network in the past. Based on analyzing the drawbacks all attacks are targeted on, improved scheme for wireless network [11].Wireless IDS will be an important part of the WLAN.…”
Section: Related Workmentioning
confidence: 99%
“…The ability to deal with such attacks and maintain an acceptable level of prevention system in order to overcome such thread in presence of attack are the crucial issue in the design of a IPS for wireless network .Several complementary approaches are proposed in recent works to address this issue. For example, What are types of attacks and how to deal with such attacks, present intrusion system have some deficiencies [1].Intrusion detection system (IDS) can judge the destruction system and intrusion events by analyzing the network to transfer data. In some cases, simply using the firewall or authentication systems also can be broken.…”
Section: Introductionmentioning
confidence: 99%
“…The dynamic i-key encryption protocol can recognize and prohibit wardriving attacks by adding wireless packet pattern analysis to both access point and mobile node. Take NetStumbler for example; this unique pattern can be found in its 802.11 probe request frames (Tsakountakis, 2007). First, LLC encapsulated frames generated by NetStumbler contain the valise 0x00601d for organizationally unique identifier (OID) and protocol identified (PID) of 0x0001.…”
Section: Wardrivingmentioning
confidence: 99%
“…for version 3.2.0, " All your 802.11b are belong to us" for version 3.2.3 and " intentionally left blank 1" for version 3.3.0. In (Tsakountakis, 2007), authors also illustrate the pseudocode for the above pattern detection in a traditional wireless network and we extended this for dynamic i-key protocol used in a mobile ad-hoc wireless network (Fig. 7.).…”
Section: Wardrivingmentioning
confidence: 99%