Seeing the Unseen: The REVEAL Protocol to Catch the Wireless Man-in-the-Middle
Abstract
References
Recommendations
Security Vulnerabilities in Hybrid Flow-Specific Traffic-Adaptive Medium Access Control
HICSS '12: Proceedings of the 2012 45th Hawaii International Conference on System SciencesWireless network security is a daunting challenge as researchers analyze the vulnerabilities of wireless medium access control schemes such as IEEE 802.11, Bluetooth, and IEEE 802.16. While these wireless protocols employ traditional contention and non-...
Man in the Browser Attacks
Man-in-the-Browser attacks are a sophisticated new hacking technique associated with Internet crime, especially that which targets customers of Internet banking. The security community has been aware of them as such for time but they have grown in ...
Fragility of the Robust Security Network: 802.11 Denial of Service
ACNS '09: Proceedings of the 7th International Conference on Applied Cryptography and Network SecurityThe upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two other DoS vulnerabilities: one vulnerability in draft 802.11w ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
- Research
- Refereed limited
Funding Sources
- Office of Naval Research
- US ARMY
- Department of Homeland Security
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 61Total Downloads
- Downloads (Last 12 months)41
- Downloads (Last 6 weeks)9
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in