Skip Nav Destination
ASME Press Select Proceedings
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)Available to Purchase
Editor
V. E. Muhin,
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
130 The Study of Sniffing Techniques and Defensive Strategy in WIFI Available to Purchase
By
Shi Zheng
Shi Zheng
Computer School,
Huangshi Institute of Technology
, Huangshi, Hubei Province,
; [email protected]China
, 435003
Search for other works by this author on:
Page Count:
4
-
Published:2011
Citation
Zheng, S. "The Study of Sniffing Techniques and Defensive Strategy in WIFI." International Conference on Information Technology and Computer Science, 3rd (ITCS 2011). Ed. Muhin, VE, & Hu, WB. ASME Press, 2011.
Download citation file:
A Wi-Fi enabled device such as a personal computer, video game console, smartphone, and digital audio player can connect to the Internet when within range of a wireless network connected to the Internet. This article describes sniffing techniques that attackers have used in Wi-Fi, and suggests various security defensive strategies. We describe how SSIDs can be determined, how a sufficiently large number of frames can be collected so that WEP can be cracked. We conclude the article with several ways that will help improve security at a wireless deployment site.
Abstract
Keywords
Introduction
Ieee 802.11 Overview
Sniffing Techniques in Wi-Fi
Security Defensive Strategy in Wi-Fi
Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
SENMAN: A Secure Encoder for MANET
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
Providing Enhanced Nextgen VoIP Service Using Packetcable Network with Efficient QoS
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Software Development Life Cycle (SDLC) Based Method to Test Security of the Ajax-Enabled Rich Internet Applications
International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-China 2011), Volumes 1–3
A Study on the Application of Internet Video in Rural Medicine Distribution
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Related Articles
Virtual Web Plant: An Internet-Based Plant Engineering Information System
J. Comput. Inf. Sci. Eng (September,2001)
Pandora’s Net
Mechanical Engineering (January,2015)
Interoperability Standards in the Semantic Web
J. Comput. Inf. Sci. Eng (March,2002)