scholarly journals Antidrone Wireless Personal Shield

Author(s):  
M. IVANCIU ◽  
M. ALEXANDRU

The evolution of small drone technology raises new challenges regarding personal privacy due to the acquisition and flight of unlicensed small drones. Many of these small drones are controlled over Wi-Fi connection making them inexpensive and easy to control. Latest discoveries in vulnerabilities of wireless network protocols give us the advantage to use cyber-attacks as a method of defense. This paper is addressing general audience on how to create a personal shield against small drones with the advantage of being nonintrusive to the other surrounding wireless networks and, at the same time, protecting your personal privacy of a rogue drone.

2018 ◽  
Vol 27 (47) ◽  
Author(s):  
Alberto Acosta-López ◽  
Elver Yesid Melo-Monroy ◽  
Pablo Andrés Linares-Murcia

Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.


2017 ◽  
pp. 603-614
Author(s):  
Renato Mariz de Moraes ◽  
Hamid R. Sadjadpour

Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


2003 ◽  
Vol 52 (4) ◽  
pp. 1099-1109 ◽  
Author(s):  
Ruay-Shiung Chang ◽  
Wei-Yeh Chen ◽  
Yean-Fu Wen

2012 ◽  
Vol 6 (14) ◽  
pp. 2115 ◽  
Author(s):  
M.S. Obaidat ◽  
P. Nicopolitidis ◽  
S.K. Dhurandher

Sign in / Sign up

Export Citation Format

Share Document