Home   >   CSC-OpenAccess Library   >    Manuscript Information
Detecting and Localizing Wireless Network Attacks Techniques
Iyad Aldasouqi, Walid Salameh
Pages - 82 - 97     |    Revised - 25-02-2010     |    Published - 26-03-2010
Volume - 4   Issue - 1    |    Publication Date - March 2010  Table of Contents
Security, Sensors, wireless, Authentication, Access points
In order to increase employee productivity within a feasible budget, we have to track new technologies, investigate and choose the best plan and implementation of these technologies. WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss some techniques and approaches which can help to detect, localize and identify wireless network attacks, which present a unique set of challenges to IT and security professionals. All efforts were focusing on the ability to identity based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. Also, to be sure that the network is able to robustly identify each transmitter independently of packet contents, allowing detection of a large class of identity-based attacks with high probability. The attacker can listen to all wireless traffic, compromise encryption and Use attenuators, amplifiers, directional antennas, software radios, but he cannot be at the location of user or at the location of access points. However, we have to choose the best design, implementation, and evaluation techniques in order to secure our network from attackers, where our choice will depend on a technical implementation to mitigate the risk on the enterprise network infrastructure.
CITED BY (5)  
1 Bikov, D., Bouyuklieva, S., & Stojanova, A. (2014). Wireless network security and cracking security key.
2 Aldasouqi, I., & Salameh, W. A. (2014). Using GIS in Designing and Deploying Wireless Network in City Plans.
3 Gracy, S. A., & Jayakumar, C. (2013). Identifying and Locating Multiple Spoofing Attackers Using Cluster Analysis. In International Conference on Engineering and Technology (p. 123).
4 AKL Ahmed, T. Gayraud and P. Berthou, “A New Wireless Architecture for In-Flight Entertainment Systems Inside Aircraft Cabin”, International Journal on Advances in Networks and Services, 4(1 & 2), pp. 159-175, 2011.
5 I. Aldasouqi and W. Salameh, “Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment”, International Journal of Security (IJS), 4(5), pp. 85 – 99, 2010.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
15 PdfSR 
FOR BOOKS: T. S. Rappaport. Wireless Communications – Principles and Practice. Prentice Hall PTR, 2nd edition, Jan. 2002.
FOR CONFERENCES: J. Hall, M. Bareau, and E. Kranakis, “Using transceiverprints for anomaly based intrusion detection,” in Proceedings of 3rd IASTED, CIIT, Nov. 2004, pp. 22–24.
FOR CONFERENCES: LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci_cations - Amendment 6: Medium Access Control (MAC) Security Enhancements. Technical Report 2004 Edition, IEEE Std 802.11i, July 2004.
FOR CONFERENCES: N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In ACM Intl. Conf. on Mobile Computing Networking (Mobicom'07), Sept. 2007.
FOR CONFERENCES: PARADIS: Physical 802.11 Device Identification with Radiometric Signatures by Vladimir Brik, Suman Banerjee, Marco Gruteser, Sangho Oh
FOR CONFERENCES: Swisscom.com. “Swisscom Mobile to launch Public Wireless LAN on 2, December 2002.” 2 Jan. 2003. URL: http://www.swisscom.com/mr/content/media/20020924_EN.html (9 Dec. 2002).
FOR CONFERENCES: Wireless Intrusion Detection Systems, SANS, Ken Hutchison, 2004
FOR CONFERENCES: Y. Sheng, G. Chen, K. Tan, U. Deshpande, B. Vance, C. McDonald, H. Yin, T. Henderson, D. Kotz, A. Campbell, and J. Wright, “Securing 802.11 wireless networks through fine-grained measurements,” Submitted to IEEE Wireless Communications Magazine.
FOR CONFERENCES: Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In Proc. 5th ACM Workshop on Wireless Security (WiSe'06), pages 33-42, Sept. 2006.
FOR JOURNALS: Advancing Wireless Link Signatures for Location Distinction, by Junxing Zhangy Mohammad H. Firoozz Neal Patwariz Sneha K. Kaseray
FOR JOURNALS: D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using singalprints,” in Proceedings of WiSe’06: ACM Workshop on Wireless Security, Sept. 2006, pp. 43–52.
FOR JOURNALS: H. Hashemi. The Indoor Radio Propagation Channel. Proceedings of IEE, 81(7):943-968, July 1993.
FOR JOURNALS: K. J. Ellis and N. Serinken. Characteristics of Radio Transmitter Fingerprints. Radio Science, 36:585-598, 2001.
FOR JOURNALS: M. Gruteser and D. Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. Mobile Networks and Applications, 10(3):315-325, June 2005.
FOR JOURNALS: R. A. Redner and H. F. Walker, “Mixture densities, maximum likelihood and the EM algorithm,” SIAM Review, vol. 26, no. 2, pp. 195–239, 1984.
FOR JOURNALS: Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless, Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and Jens B. Schmitt
FOR JOURNALS:Mobile and Wireless Network Security and Privacy, Edited by S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki. 2007 Springer
Mr. Iyad Aldasouqi
- Jordan
Mr. Walid Salameh
- Jordan