International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Deception based Model for Mitigation of Beacon Forgeries in Wi-Fi Networks

Author :Rohit Jaysankar, Sriram Sankaran

Article Citation :Rohit Jaysankar ,Sriram Sankaran , (2022 ) " Deception based Model for Mitigation of Beacon Forgeries in Wi-Fi Networks " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 26-30, Volume-10,Issue-11

Abstract : Abstract - Wi-Fi is a popular technology nowadays. An access point is an important component of a Wi-Fi network. These access points use management frames called beacons to broadcast their capability and information like SSID, BSSID, channel rates supported, encryption used etc. Unfortunately, these beacons are not well protected. An attacker can easily forge the beacon and use them to launch several attacks like power constraint attack, Invalid HT element attack, quiet attack etc. Most of the existing work in this field tries to defend against forgery by using beacon authentication, dedicated monitoring system, location sensors etc. The downside of this approach is that the attacker will also be able to find out about the defense deployment and will try to invest more energy into compromising the defense. Once the defense is compromised the defender will have to invest more resources in a new defense strategy. In this project, we propose a deception model to deceive the attacker’s belief regarding the attack. In this way, the defender can minimize its resource utilization and the attacker will also not invest more resources since he is confident regarding his success. By using the deception model we were able to mitigate 97% of the beacon forgery impact. Keywords - Networks, Beacons, Deception model, Kali Linux, Multiplexer.

Type : Research paper

Published : Volume-10,Issue-11


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-19198   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 42
| Published on 2023-01-05
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY