Share Email Print

Proceedings Paper

Competition in the domain of wireless networks security
Author(s): Mariusz Bednarczyk
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims’ mobile device features if the users forget to use simple safety principles.

Paper Details

Date Published: 20 April 2017
PDF: 9 pages
Proc. SPIE 10418, XI Conference on Reconnaissance and Electronic Warfare Systems, 104180A (20 April 2017); doi: 10.1117/12.2269300
Show Author Affiliations
Mariusz Bednarczyk, Military Univ. of Technology (Poland)

Published in SPIE Proceedings Vol. 10418:
XI Conference on Reconnaissance and Electronic Warfare Systems
Jerzy Lopatka, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?