The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The wireless boundaries of networks are becoming increasingly important from a security standpoint as the proliferation of 802.11 WiFi technology increases. Concurrently, the complexity of 802.11 access point implementation is rapidly outpacing the standardization process. The result is that nascent wireless functionality management is left up to the individual provider's implementation, which creates...
This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on known issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes...
Free open wireless Internet access is a complimentary Wi-Fi service offered by most coffee shops, fast food restaurants and airports to their customers. For ease of access, these Wi-Fi networks are inherently insecure where no authentication/ encryption is used to protect customers wireless data. An attacker can easily deceive a wireless customer (WC) by setting up a rogue access point (RAP) impersonating...
Future vehicles will be wirelessly connected to nearby vehicles, to the road infrastructure and to the Internet in order to enable new comfort features, safety functions and a number of new vehicle-specific services. The latter will include a fast, secure, and reliable way to remotely diagnose and reconfigure a vehicle as well as to install new software on the electronic control units integrated in...
Wireless local area networks (WLANs) deployment is increasing rapidly. At the same time, WLANs have become an attractive target for many potential attackers. In spite of that, the de facto standard used to implement most WLANs (IEEE 802.11) has what appear to be residual vulnerabilities related to identity spoofing. In this paper, a pragmatic study of two common attacks on the standard is conducted...
Among the current Wi-Fi two security models (Enterprise and Personal), while the Enterprise model (802.1X) offers an effective framework for authenticating and controlling the user traffic to a protected network, the Personal model (802.11) offers the cheapest and the easiest to setup solution. However, the drawback of the personal model implementation is that all access points and client radio NIC...
Ship Reporting Systems (SRSs) have been standardized with the goal of enforcing safety in navigation. Automatic Identification System (AIS) is the most known SRS but, given the limited available bandwidth, it supports a simple, basic set of services without dealing with security aspects. Specifically to address such weaknesses, this paper explores a possible backward-compatible solution aimed at increasing...
Wi-Fi network offers an inexpensive and convenient way to access the Internet. It becomes even more important nowadays as we are moving from the traditional computer age to the current mobile devices and Internet-of-Things age. Wi-Fi Protected Access II (WPA2) - Pre-shared key (PSK) is the current security standard used to protect small 802.11 wireless networks. Most of the available dictionary password-guessing...
Steganography and Covert channels, their design and detection has been one of the most important issues in security systems and computer networks. One of the media that is used for steganography is JPEG images. The purpose of many steganography techniques in pictures is to insert more covert information in image's pixels with few changes. One of methods in JPEG steganography is EMD (Exploiting Modification...
Wireless covert channels promise to exfiltrate information with high bandwidth by circumventing traditional access control mechanisms. Ideally, they are only accessible by the intended recipient and—for regular system users/operators—indistinguishable from normal operation. While a number of theoretical and simulation studies exist in literature, the practical aspects of WiFi covert channels are not...
The implausible rise in the consumption of WLANs is practiced in most of the business and non-business, in the last few years, however motionless many vulnerabilities are found in present WLAN that anyone can take advantage of it. However rightful hosts that may be either intruders or RAP which are in attendance without knowledge or authorization. The adversaries take advantage of common vulnerabilities...
There has been a huge growth in the number of wireless-enabled devices possessed by a user. Over two third of adults in United States currently own three devices — laptop, smartphone and tablet. In this paper, we provide a first look at the network usage behavior of today's multi-device users. Using the data collected from a large university campus, we provide a detailed measurement-based characterization...
IEEE 802.11 set of standards grew from a highly obscured and unsecured technology to a robust and reliable solution for many of us. Broad acceptance and relatively simple implementation also made 802.11 a perfect target for possible exploitation. Recently discovered wireless driver vulnerabilities exposed a new critical threat that legitimate users community is facing. What makes this vulnerability...
We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity Wi- Fi networks. It is the first scheme that combines the distributed wireless media surveillance and the centralized wired end socket level traffic "fingerprinting" The former is designed not only to detect various types of rogue APs, but also to discover suspicious activities so as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.