Matches in SemOpenAlex for { <https://semopenalex.org/work/W4226310214> ?p ?o ?g. }
Showing items 1 to 70 of
70
with 100 items per page.
- W4226310214 endingPage "568" @default.
- W4226310214 startingPage "559" @default.
- W4226310214 abstract "AbstractNumerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become an imperative activity of any user to understand the threats. Even after thoroughly encrypting them, the route between the attacker’s device and the victim’s device may even be vulnerable to security attacks on Wi-Fi networks. It has also been noted that there are current shortcomings on Wi-Fi security protocols and hardware modules that are available in the market. Any device connected to the network could be a possible primary interface for attackers. Wi-Fi networks that are available in the transmission range are vulnerable to threats. For instance, if an Access Point (AP) has no encrypted traffic while it is attached to a Wi-Fi network, an intruder may run a background check to launch the attack. And then, attackers could launch more possible attacks in the targeted network, in which the Evil Twin attack have become the most prominent. This Evil Twin attack in a Wi-Fi network is a unique outbreak mostly used by attackers to make intrusion or to establish an infection where the users are exploited to connect with a victim’s network through a nearby access point. So, there are more chance to get user’s credentials by the perpetrators. An intruder wisely introduces a fake access point that is equivalent to something looks like an original access point near the network premises in this case. So, an attacker is capable of compromising the network when a user unconsciously enters by using this fake access point. Attackers could also intercept the traffic and even the login credentials used after breaching insecure networks. This could enable monitoring the users and perhaps even manipulating the behavior patterns of an authorized network user smoother for attackers. The key consideration of this research paper is the identification and avoidance of the Evil Twin attack over any Wi-Fi networks. It is named as DPETAs to address the strategies that intruders use to extract identities and what users need to do to keep them out of the networks.KeywordsManagement framesFake access points802.11 standardsWi-Fi attacksMan in the middle (MITM) attackEvil twin AP attacks" @default.
- W4226310214 created "2022-05-05" @default.
- W4226310214 creator A5001389797 @default.
- W4226310214 creator A5016552920 @default.
- W4226310214 creator A5038758562 @default.
- W4226310214 creator A5044771843 @default.
- W4226310214 date "2022-01-01" @default.
- W4226310214 modified "2023-09-29" @default.
- W4226310214 title "DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks" @default.
- W4226310214 cites W2575002702 @default.
- W4226310214 cites W2756189185 @default.
- W4226310214 cites W2776043894 @default.
- W4226310214 cites W2796291220 @default.
- W4226310214 cites W2911132314 @default.
- W4226310214 cites W2937503132 @default.
- W4226310214 cites W2947962835 @default.
- W4226310214 cites W2964488202 @default.
- W4226310214 cites W2967609625 @default.
- W4226310214 cites W2997344118 @default.
- W4226310214 cites W2997692375 @default.
- W4226310214 cites W3005664640 @default.
- W4226310214 cites W3008893130 @default.
- W4226310214 cites W3081633500 @default.
- W4226310214 cites W3118308520 @default.
- W4226310214 cites W3158799343 @default.
- W4226310214 cites W4240774184 @default.
- W4226310214 cites W4241860797 @default.
- W4226310214 doi "https://doi.org/10.1007/978-981-16-9012-9_45" @default.
- W4226310214 hasPublicationYear "2022" @default.
- W4226310214 type Work @default.
- W4226310214 citedByCount "0" @default.
- W4226310214 crossrefType "book-chapter" @default.
- W4226310214 hasAuthorship W4226310214A5001389797 @default.
- W4226310214 hasAuthorship W4226310214A5016552920 @default.
- W4226310214 hasAuthorship W4226310214A5038758562 @default.
- W4226310214 hasAuthorship W4226310214A5044771843 @default.
- W4226310214 hasConcept C108827166 @default.
- W4226310214 hasConcept C148730421 @default.
- W4226310214 hasConcept C2524010 @default.
- W4226310214 hasConcept C28719098 @default.
- W4226310214 hasConcept C31258907 @default.
- W4226310214 hasConcept C33923547 @default.
- W4226310214 hasConcept C38652104 @default.
- W4226310214 hasConcept C41008148 @default.
- W4226310214 hasConceptScore W4226310214C108827166 @default.
- W4226310214 hasConceptScore W4226310214C148730421 @default.
- W4226310214 hasConceptScore W4226310214C2524010 @default.
- W4226310214 hasConceptScore W4226310214C28719098 @default.
- W4226310214 hasConceptScore W4226310214C31258907 @default.
- W4226310214 hasConceptScore W4226310214C33923547 @default.
- W4226310214 hasConceptScore W4226310214C38652104 @default.
- W4226310214 hasConceptScore W4226310214C41008148 @default.
- W4226310214 hasLocation W42263102141 @default.
- W4226310214 hasOpenAccess W4226310214 @default.
- W4226310214 hasPrimaryLocation W42263102141 @default.
- W4226310214 hasRelatedWork W1548040509 @default.
- W4226310214 hasRelatedWork W2130966263 @default.
- W4226310214 hasRelatedWork W2161954659 @default.
- W4226310214 hasRelatedWork W2290623933 @default.
- W4226310214 hasRelatedWork W2350992405 @default.
- W4226310214 hasRelatedWork W2354995278 @default.
- W4226310214 hasRelatedWork W2362737126 @default.
- W4226310214 hasRelatedWork W2742881601 @default.
- W4226310214 hasRelatedWork W2964271480 @default.
- W4226310214 hasRelatedWork W3155357916 @default.
- W4226310214 isParatext "false" @default.
- W4226310214 isRetracted "false" @default.
- W4226310214 workType "book-chapter" @default.