期刊文献+

物联网应用中基于非法接入点的无线拒绝服务攻击研究 被引量:3

Study on the RAP Based Wireless Denial of Service Attacks in IOT Applications
原文传递
导出
摘要 WiFi无线通信技术在物联网应用领域处于重要地位,常见的WiFi物联网终端设备包括无线网络摄像头、智能手机、PDA、平板电脑、笔记本电脑、智能家居网关和工业自动化控制网关等。攻击者可以通过使用非法接入点发送断网指令给WiFi物联网终端,使它们中断正常的数据通信。目前,国内外还没有有效的解决这类问题的方案。本论文研究了基于非法接入点所实施的无线攻击的特点,分析了攻击的基本原理,并为解决这类攻击提出了有效的方案。 WiFi wireless communication technology plays an important role in lntemet of things ( IOT ) applications, and the popular IOT terminal devices include wireless network cameras, smart phones, tablet computers, notebook computers, PDA, smart home gateway and industrial automation control gateway etc.. An attacker can use a rogue access point ( RAP ) for sending faked deauthentication or disassociation frames to terminate the data communication of the legitimate WiFi lOT ten,final devices. At present, there are no effective solutions to resolve the RAP based DoS attacks. This paper studies the characteristics of the RAP based wireless DoS attack, analyzes the attack mechanisms, and provides a possible solution to prevent this kind of attack.
出处 《网络安全技术与应用》 2014年第7期166-170,共5页 Network Security Technology & Application
基金 福建省自然科学基金资助项目(2012J01283) 福建省教育厅省属高校科研专项计划项目(JK2012051) 福建省科技计划项目(2013N0031)
关键词 物联网 WIFI 非法接入点 无线拒绝服务攻击 802 11w Internet of things WiFi Rogue access point Wireless DoS attack 802.11w
  • 相关文献

参考文献10

  • 1姚仲敏,林大伟.基于物联网的低成本农区奶牛信息平台设计[J].黑龙江畜牧兽医,2014(3):66-69. 被引量:2
  • 2宋威,黄进,尹航,庞志远,梁鹏程.基于WIFI物联网的家电智能控制系统信息控制端的研究[J].信息通信,2013,26(1):199-200. 被引量:10
  • 3物联网无线应用分析[J].电子技术应用,2011,37(1):24-25. 被引量:4
  • 4Tabish,R.,Ghaleb,A.M.,Hussein,R.,Touati,F.,Ben Mnaouer,A.,Khriji,L.,Rasid,M.F.A.A 3G/WiFi-enabled 6LoWPAN-based U-healthcare system for ubiquitous real-time monitoring and data logging.2014 Middle East Conference on Biomedical Engineering (MECBME),2014:277-280.
  • 5Liu Chibiao,Qiu Jinming,Lu Changjing.Security Study of Voice Communication over Wireless Local Area Network.The InternationalConference on Electronics,Communications and Control (ICECC2011),2011:459-462.
  • 6Chibiao Liu,James Yu,Greg Brerester.Empirical Studies and Queuing Modeling of Denial of Service Attacks against 802.11WLANs.IEEE International Symposium ona World of Wireless,Mobile and Multimedia Networks (WoWMoM 2010),2010:1-9.
  • 7Chibiao Liu,James Yu.RogueAccess Point Based DoS Attacks against 802.11 WLANs.Proceedings of the 2008 Fourth Advanced International Conference on Telecommunications,2008:271-276.
  • 8Eian,M.,Mjolsnes,S.F.A formal analysis of IEEE 802.11w deadlock vulnerabilities.INFOCOM,2012 Proceedings IEEE,2012:918-926.
  • 9Weijia Wang,Haihang Wang.Weakness in 802.11w and an improved mechanism on protection of management frame.2011 International Conference on Wireless Communications and Signal Processing (WCSP),2011:1-4.
  • 10Md.Sohail Ahmad,Shashank Tadakamadla.Short paper:security evaluation of IEEE 802.11w specification.Proceedings of the fourth ACM conference on Wireless network security,2011:53-58.

二级参考文献14

共引文献11

同被引文献7

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部