Authors
Joseph Soryal, Irippuge Milinda Perera, Ihab Darwish, Nelly Fazio, Rosario Gennaro, Tarek Saadawi
Publication date
2014/5/13
Conference
2014 IEEE 28th International Conference on Advanced Information Networking and Applications
Pages
472-479
Publisher
IEEE
Description
The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access the Internet via Wi-Fi wireless networks or communicate with one another directly in a peer-to-peer mode. Insider attacks are those originating from a trusted node that had initially passed all the authentication steps to access the network and then got compromised. A trusted node that has turned rogue can easily perform Denial-of-Service (DoS) attacks on the Media Access Control (MAC) layer by illegally capturing the channel and preventing other legitimate nodes from communicating with one another. Insider attackers can alter the implementation of the IEEE 802.11 Distributed Coordination Function (DCF) protocol residing in the Network Interface Card (NIC) to illegally increase the probability of successful packet transmissions into the channel at the expenses of nodes that follow the protocol standards. The attacker fools …
Total citations
20142015201620172018201911
Scholar articles
J Soryal, IM Perera, I Darwish, N Fazio, R Gennaro… - 2014 IEEE 28th International Conference on Advanced …, 2014