{"title":"无线网络中模拟攻击研究综述","authors":"R. Regan, J. Manickam","doi":"10.14257/IJSIA.2017.11.5.04","DOIUrl":null,"url":null,"abstract":"Commucation being a mode of sending and receiving understanding is gaining extra popularity in today’s world. Today wireless systems are increasingly getting used for primary conversation and undertaking to hold electronic knowledge transmissions comfortable. Almost always, it's problematic to implement mighty security in small-footprint devices having low processing power, low memory capacity and utilising unreliable, low bandwidth. Impersonation attack may be very common in these days in wireless network, but the principal hindrance is the security. There is lots of solution provided by different researcher but still faces research challenge. Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes. As a rule this would be some of the first steps to intervene a network with the intention of accomplishing further assaults to disrupt operation. In this paper we describe the causes of Wireless impersonation attack, their vulnerable effects and various defense mechanisms for defending this attack.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Survey on Impersonation Attack in Wireless Networks\",\"authors\":\"R. Regan, J. Manickam\",\"doi\":\"10.14257/IJSIA.2017.11.5.04\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Commucation being a mode of sending and receiving understanding is gaining extra popularity in today’s world. Today wireless systems are increasingly getting used for primary conversation and undertaking to hold electronic knowledge transmissions comfortable. Almost always, it's problematic to implement mighty security in small-footprint devices having low processing power, low memory capacity and utilising unreliable, low bandwidth. Impersonation attack may be very common in these days in wireless network, but the principal hindrance is the security. There is lots of solution provided by different researcher but still faces research challenge. Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes. As a rule this would be some of the first steps to intervene a network with the intention of accomplishing further assaults to disrupt operation. In this paper we describe the causes of Wireless impersonation attack, their vulnerable effects and various defense mechanisms for defending this attack.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.5.04\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.5.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Impersonation Attack in Wireless Networks
Commucation being a mode of sending and receiving understanding is gaining extra popularity in today’s world. Today wireless systems are increasingly getting used for primary conversation and undertaking to hold electronic knowledge transmissions comfortable. Almost always, it's problematic to implement mighty security in small-footprint devices having low processing power, low memory capacity and utilising unreliable, low bandwidth. Impersonation attack may be very common in these days in wireless network, but the principal hindrance is the security. There is lots of solution provided by different researcher but still faces research challenge. Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes. As a rule this would be some of the first steps to intervene a network with the intention of accomplishing further assaults to disrupt operation. In this paper we describe the causes of Wireless impersonation attack, their vulnerable effects and various defense mechanisms for defending this attack.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security