Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the ne...
Main Author: | Wang, Le |
---|---|
Other Authors: | Alexander M. Wyglinski, Advisor |
Format: | Others |
Published: |
Digital WPI
2013
|
Subjects: | |
Online Access: | https://digitalcommons.wpi.edu/etd-theses/992 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses |
Similar Items
-
An Approach for Prevention of MitM Attack Based on Rogue AP in Wireless Network
by: Zhendong Wu, et al.
Published: (2014-12-01) -
Man-in-the-middle-attack: Understanding in simple words
by: Avijit Mallik, et al.
Published: (2019-06-01) -
Hybrid Deep Learning Model Based Indoor Positioning Using Wi-Fi RSSI Heat Maps for Autonomous Applications
by: Alwin Poulose, et al.
Published: (2021-12-01) -
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
by: Jian Guo, et al.
Published: (2017-02-01) -
Provably curb man-in-the-middle attack-based ARP spoofing in a local network
by: Hussain, M.A, et al.
Published: (2022)