List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
Detecting and Localizing Wireless Network Attacks Techniques
Full text
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(3.86MB)
Volume:  4    Issue:  1
Pages:  1-148
Publication Date:   March 2010
ISSN (Online): 1985-1553
82 - 97
Iyad Aldasouqi - Jordan
Walid Salameh - Jordan
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   Security, Sensors, wireless, Authentication, Access points 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. Scribd
3. Docstoc
5. CiteSeerX
6. Google Scholar
7. ScientificCommons
8. WorldCat
9. Bielefeld Academic Search Engine (BASE)
10. ResearchGATE
11. refSeek
12. Academic Index
13. Socol@r
14. iSEEK
15. Academic Journals Database
16. slideshare
In order to increase employee productivity within a feasible budget, we have to track new technologies, investigate and choose the best plan and implementation of these technologies. WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss some techniques and approaches which can help to detect, localize and identify wireless network attacks, which present a unique set of challenges to IT and security professionals. All efforts were focusing on the ability to identity based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. Also, to be sure that the network is able to robustly identify each transmitter independently of packet contents, allowing detection of a large class of identity-based attacks with high probability. The attacker can listen to all wireless traffic, compromise encryption and Use attenuators, amplifiers, directional antennas, software radios, but he cannot be at the location of user or at the location of access points. However, we have to choose the best design, implementation, and evaluation techniques in order to secure our network from attackers, where our choice will depend on a technical implementation to mitigate the risk on the enterprise network infrastructure.  
1 FOR CONFERENCES: Wireless Intrusion Detection Systems, SANS, Ken Hutchison, 2004
2 FOR JOURNALS:Mobile and Wireless Network Security and Privacy, Edited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki. 2007 Springer
3 FOR CONFERENCES: “Swisscom Mobile to launch Public Wireless LAN on 2, December 2002.” 2 Jan. 2003. URL: (9 Dec. 2002).
4 FOR CONFERENCES: LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci_cations - Amendment 6: Medium Access Control (MAC) Security Enhancements. Technical Report 2004 Edition, IEEE Std 802.11i, July 2004.
5 FOR CONFERENCES: J. Hall, M. Bareau, and E. Kranakis, “Using transceiverprints for anomaly based intrusion detection,” in Proceedings of 3rd IASTED, CIIT, Nov. 2004, pp. 22–24.
6 FOR CONFERENCES: Y. Sheng, G. Chen, K. Tan, U. Deshpande, B. Vance, C. McDonald, H. Yin, T. Henderson, D. Kotz, A. Campbell, and J. Wright, “Securing 802.11 wireless networks through fine-grained measurements,” Submitted to IEEE Wireless Communications Magazine.
7 FOR JOURNALS: R. A. Redner and H. F. Walker, “Mixture densities, maximum likelihood and the EM algorithm,” SIAM Review, vol. 26, no. 2, pp. 195–239, 1984.
8 FOR JOURNALS: D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using singalprints,” in Proceedings of WiSe’06: ACM Workshop on Wireless Security, Sept. 2006, pp. 43–52.
9 FOR JOURNALS: H. Hashemi. The Indoor Radio Propagation Channel. Proceedings of IEE, 81(7):943-968, July 1993.
10 FOR BOOKS: T. S. Rappaport. Wireless Communications – Principles and Practice. Prentice Hall PTR, 2nd edition, Jan. 2002.
11 FOR JOURNALS: K. J. Ellis and N. Serinken. Characteristics of Radio Transmitter Fingerprints. Radio Science, 36:585-598, 2001.
12 FOR JOURNALS: M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks and Applications, 10(3):315-325, June 2005.
13 FOR JOURNALS: Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless, Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and Jens B. Schmitt
14 FOR JOURNALS: Advancing Wireless Link Signatures for Location Distinction, by Junxing Zhangy Mohammad H. Firoozz Neal Patwariz Sneha K. Kaseray
15 FOR CONFERENCES: N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In ACM Intl. Conf. on Mobile Computing Networking (Mobicom'07), Sept. 2007.
16 FOR CONFERENCES: Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In Proc. 5th ACM Workshop on Wireless Security (WiSe'06), pages 33-42, Sept. 2006.
17 FOR CONFERENCES: PARADIS: Physical 802.11 Device Identification with Radiometric Signatures by Vladimir Brik, Suman Banerjee, Marco Gruteser, Sangho Oh
1 AKL Ahmed, T. Gayraud and P. Berthou, “A New Wireless Architecture for In-Flight Entertainment Systems Inside Aircraft Cabin”, International Journal on Advances in Networks and Services, 4(1 & 2), pp. 159-175, 2011.
2 I. Aldasouqi and W. Salameh, “Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment”, International Journal of Security (IJS), 4(5), pp. 85 – 99, 2010.
1 TechRepublic
3 peekyou
4 King Abdullah School for Graduate Studies and Scientific Research
Iyad Aldasouqi : Colleagues
Walid Salameh : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.