scholarly journals Active and Passive Security Attacks in Wireless Networks and Prevention Techniques

Author(s):  
Sun Jun Ee ◽  
Jeshua Woon Tien Ming ◽  
Jia Suan Yap ◽  
Scott Chuen Yuen Lee ◽  
Fatima tuz Zahra

In this modern day and age, wireless networks are everywhere. It is not a far stretch to say that it is downright crucial due to its ability to keep people connected and updated everywhere from universities and workplaces down to our personal homes. Though the benefits of wireless networks are undeniable, it also brings a new host of security concerns due to the amount of sensitive data being transmitted through these networks. A simple attack such as packet sniffing is enough to “sniff” out just enough data to cripple even giant corporate bodies if left unchecked. The aim of this research paper is to dissect and discuss the security and privacy issues of wireless networks that surround us. An interesting finding would be that wireless networks are heavily susceptible to both malicious attacks such as denial of service attacks and passive attacks like eavesdropping. It was also noted that information is more easily obtainable through wireless networks as compared to wired networks due to the ability to gleam information from long distances without having to be physically present on site. A literature review and a survey were conducted to learn about the opinions of casual users of wireless networks. The information gathered suggests that while there are many who care about privacy, they still lack the necessary knowledge to protect said privacy. These users carelessly connect to public wireless networks wherever it is available without proper precaution and care. Appropriate relevant solutions are presented based on literature study to overcome insecure wireless network usage practices in order to avoid active and passive attacks.

2020 ◽  
Author(s):  
Sun Jun Ee ◽  
Jeshua Woon Tien Ming ◽  
Jia Suan Yap ◽  
Scott Chuen Yuen Lee ◽  
Fatima tuz Zahra

In this modern day and age, wireless networks are everywhere. It is not a far stretch to say that it is downright crucial due to its ability to keep people connected and updated everywhere from universities and workplaces down to our personal homes. Though the benefits of wireless networks are undeniable, it also brings a new host of security concerns due to the amount of sensitive data being transmitted through these networks. A simple attack such as packet sniffing is enough to “sniff” out just enough data to cripple even giant corporate bodies if left unchecked. The aim of this research paper is to dissect and discuss the security and privacy issues of wireless networks that surround us. An interesting finding would be that wireless networks are heavily susceptible to both malicious attacks such as denial of service attacks and passive attacks like eavesdropping. It was also noted that information is more easily obtainable through wireless networks as compared to wired networks due to the ability to gleam information from long distances without having to be physically present on site. A literature review and a survey were conducted to learn about the opinions of casual users of wireless networks. The information gathered suggests that while there are many who care about privacy, they still lack the necessary knowledge to protect said privacy. These users carelessly connect to public wireless networks wherever it is available without proper precaution and care. Appropriate relevant solutions are presented based on literature study to overcome insecure wireless network usage practices in order to avoid active and passive attacks.


Author(s):  
Alya Hannah Ahmad Kamal ◽  
Caryn Chuah Yi Yen ◽  
Pang Sze Ling ◽  
Fatima -tuz-Zahra

The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access to the information to achieve their goals, whether it is to sell it on the dark web or for other malicious intent. Through thorough literature study relating to the causes and issues that are brought from the security and privacy segment of wireless networks, it is observed that there are various factors that can cause the networks to be an insecure; especially factors that revolve around cybercriminals with their growing expertise and the lack of preparation and efforts to combat them by relevant bodies. The aim of this paper is to showcase major and frequent security as well as privacy issues in wireless networks along with specialized solutions that can assist the related organizations or the public to fathom how great of an impact these challenges can bring if every related stakeholder took a step in reducing them. Through this paper it is discovered that there are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.


Author(s):  
Lawan A. Mohammed ◽  
Biju Issac

This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.


Author(s):  
Eralda Caushaj ◽  
Huirong Fu ◽  
Ishwar Sethi ◽  
Haissam Badih ◽  
Dion Watson ◽  
...  

The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user’s information? What are the threats and countermeasures that the users should be aware of? The aim of the authors’ paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.


Author(s):  
Nurul Fatini Azhar ◽  
Qi Jie Ngoo ◽  
Tae Hyun Kim ◽  
Kohei Dozono ◽  
Fatima tuz Zahra

Communication between devices has transitioned from wired to unwired. Wireless networks have been in use widely around the globe since the advent of smartphones, IoT devices and other technologies that are compatible with wireless mode of communication. At the same time security issues have also increased in such communication methods. The aim of this paper is to propose security and privacy issues of the wireless networks and present them through comprehensive surveys. In context of security issues, there are 2 typical DDoS attacks - HTTP flood and SYN flood. Other than DDoS attacks, there are several other threats to wireless networks. One of the most prevalent include security issues in Internet of Things. In terms of privacy issues in a wireless network, location-based applications, individual data, cellular network and V2G (Vehicle to Grid) network are surveyed. The survey is hosted using questionnaire and responses of 70 participants is recorded. It is observed from the survey results that many groups of people lack the knowledge of security and privacy of wireless technologies and networks despite their increased use, however, students are relatively more aware and have strong knowledge of those issues. It is concluded from the results that an effective solution to these problems can be hosting campaigns for spreading the security and privacy laws to help the groups of people who are lagging behind in this domain of knowledge become more aware. A unique solution is also presented to overcome the security issues which include implementation of detection and mitigation techniques, implementing Blockchain in the IoT devices and implementing fog computing solutions. The unique solutions to overcome the privacy issues are proposed in the form of a privacy approach from the LBS server between pairs of users to increase the implementation of DSPM and blockchain as a solution.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


Author(s):  
Muzammil Hussain ◽  
Muhammad Waqas Nadeem ◽  
S. Iqbal ◽  
Sobia Mehrban ◽  
Syeda Nisar Fatima ◽  
...  

Financial technology (FinTech) has dramatically changed the way of banking and financial services. Computer programs and other technology which used to provide and enable financial services is named as FinTech. However, these services face several security and privacy issues while providing financial services to the users. These services and applications must be secured to enhance the acceptance and usability of these services among the users. The main aim of this research is to provide a policy framework to ensure the security and privacy of user information in financial technology, since FinTech applications and services carry quite sensitive data of its users. This policy framework provides a comprehensive set of policies to secure FinTech services. These policies must be implemented in each organization providing FinTech services.


Author(s):  
Shravani Devarakonda ◽  
Malka N. Halgamuge ◽  
Azeem Mohammad

In this chapter, the authors collected data from issues related to threats in the applications of IoT-based technologies that describe the security and privacy issues from 30 peer reviewed publications from 2014 to 2017. Further, they analyzed each threat type and its percentages in each application of the internet of things. The results indicated that the applications of smart transportation (20%) face the highest amount of security and privacy issues followed by smart home (19%) and smart cities (18%) compared to the rest of the applications. Further, they determined that the biggest threats were denial of service attack (9%) followed by eavesdropping (5%), man in the middle (4%), and replay (4%). Denial of service attacks and man in the middle attack are active attacks that can severely damage human life whereas eavesdropping is a passive attack that steals information. This study has found that privacy issues have the biggest impacts on people. Therefore, researchers need to find possible solutions to these threats to improve the quality of IoT applications.


Author(s):  
Amel Meddeb Makhlouf ◽  
Noureddine Boudriga

The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.


Author(s):  
Joarder Kamruzzaman

Security and privacy protection are very strong requirements for the widespread deployment of wireless technologies for commercial applications. The primary aim of this chapter is to present an overview of the security and privacy issues by highlighting the need to secure access to wireless networks and the loss that might accrue from the breach of a network. The vulnerabilities of the IEEE 802.11 and Bluetooth networks are discussed, and a paradigm for secure wireless network is presented. The legal framework guiding the privacy issues in wireless communications is also presented.


Sign in / Sign up

Export Citation Format

Share Document