written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: Dec 2015
written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: Dec 2015
written 7.9 years ago by |
Wireless attacks are of two sub categories:
a) N/w attacks and
b) Device Security Information Attacks
Network Attacks:
a) DoS Attacks: flooding communication server with connection request.
b) Traffic analysis: wireless cards to track traffic load
c) Eaves dropping: access data flow that is not encrypted
d) Session interception: man in middle modifies message
e) Spoofing: attacker pretends to be leg it user
f) Capturing and retransmission: msgs contain identity location and credentials.
g) Info leakage: attacker pretends to be an mss
h) Modification: database change or program
i) Fabrication
Device Attacks:
WEP (wired equivalent privacy)
Frame body and ICV are encrypted.
Receiver checks ICV value that it has computes against what has actually arrived.
If same genuine data else discarded.