This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l...This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.展开更多
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ...IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.展开更多
基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建...基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建典型场景,开展协同机制与传统机制的性能对比分析。分析结果表明,所提方案在吞吐量、时延控制、信道利用效率方面具有显著优势,具备良好的工程适用性与系统可扩展性。展开更多
在传统的无线局域网(Wireless Local Area Network,WLAN)环境下,VoIP(Voiceover Internet Protocol)业务的传输容量严重受限,大大限制了无线VoIP的发展。通过分析与仿真,发现接入点(Access Point,AP)为限制无线局域网中语音传输容量的瓶...在传统的无线局域网(Wireless Local Area Network,WLAN)环境下,VoIP(Voiceover Internet Protocol)业务的传输容量严重受限,大大限制了无线VoIP的发展。通过分析与仿真,发现接入点(Access Point,AP)为限制无线局域网中语音传输容量的瓶颈,从而有针对性地提出了动态调整AP竞争信道优先级的方法。该方法在AP队列过长时提高AP发送数据的优先级,简单易行,并可有效缓解AP的瓶颈效应。多场景下的仿真结果表明,无线局域网中语音传输容量可提高20%,而信道接入延时可降低60%左右。展开更多
基金the National Science Council (No. NSC-99-2219-E-033-001)the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
文摘This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
基金The manuscript APC is supported by the grant name(UMS No.DFK2005)“Smart Vertical farming Technology for Temperate vegetable cultivation in Sabah:practising smart automation system using IR and AI technology in agriculture 4.0”.
文摘IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection.
文摘基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建典型场景,开展协同机制与传统机制的性能对比分析。分析结果表明,所提方案在吞吐量、时延控制、信道利用效率方面具有显著优势,具备良好的工程适用性与系统可扩展性。
文摘在传统的无线局域网(Wireless Local Area Network,WLAN)环境下,VoIP(Voiceover Internet Protocol)业务的传输容量严重受限,大大限制了无线VoIP的发展。通过分析与仿真,发现接入点(Access Point,AP)为限制无线局域网中语音传输容量的瓶颈,从而有针对性地提出了动态调整AP竞争信道优先级的方法。该方法在AP队列过长时提高AP发送数据的优先级,简单易行,并可有效缓解AP的瓶颈效应。多场景下的仿真结果表明,无线局域网中语音传输容量可提高20%,而信道接入延时可降低60%左右。