Cyber Security Threats in Wireless LAN: A Literature Review

Authors

  • Mashael Saad Alghareeb College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia Author
  • Mohammad Almaiah College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia Author
  • Youakim Badr Computer Science and Engineering Department, The Pennsylvania State University, Malvern, PA, United States, USA Author

Keywords:

Wireless LANs, IEE 802.11, Attacks, Security, Access Point (AP), threat, Availability, Authentication, Integrity, Access control, Wireless Countermeasure.

Abstract

Wireless LANs have been widely deployed in places such as business organizations, government agencies, hospitals, schools, and even the home environment. Mobility, flexibility, scalability, cost-effectiveness, and rapid deployment are some of the factors driving the spread of this technology. However, due to their nature wireless LANs are vulnerable to several types of attacks. Therefore, this research aims to discuss common threats related to the wireless LAN system, and a comprehensive review of existing studies regarding cybersecurity threats in Wireless LAN. A systematic literature review (SLR) was conducted to identify potential threats and identify appropriate countermeasures for each wireless WLA.

References

[1] G. Abare and E. J. Garba, “A proposed model for enhanced security against key reinstallation attack on wireless networks,” Int. J. Sci. Res. Netw. Secur. Commun., vol. 7, no. 3, pp. 21–27, 2019.

[2] S. A. A. Ahadi, E. Baray, N. Rakesh, and S. Varshney, “Public Wi-Fi security threat evil twin attack detection based on signal variant and hop count,” AIP Conf. Proc., vol. 2424, no. 1, p. 020002, 2022.

[3] B. Alotaibi and K. Elleithy, “A new MAC address spoofing detection technique based on random forests,” Sensors, vol. 16, no. 3, p. 281, 2016.

[4] A. A. M. M. Amin and M. S. Mahamud, “An alternative approach of mitigating ARP-based man-in-the-middle attack using client site bash script,” in Proc. 6th Int. Conf. Electr. Electron. Eng. (ICEEE), 2019, pp. 112–115.

[5] M. E. Aminanto and K. Kim, “Detecting impersonation attack in WiFi networks using deep learning approach,” in Proc. Int. Workshop Inf. Secur. Appl., 2016, pp. 136–147.

[6] M. A. C. Aung and K. P. Thant, “Detection and mitigation of wireless link layer attacks,” in Proc. IEEE 15th Int. Conf. SERA, 2017, pp. 173–178.

[7] E. Baray and N. K. Ojha, “WLAN security protocols and WPA3 security approach measurement through aircrack-ng technique,” in Proc. 5th Int. Conf. Comput. Methodol. Commun. (ICCMC), 2021, pp. 23–30.

[8] B. Bhushan, G. Sahoo, and A. K. Rai, “Man-in-the-middle attack in wireless and computer networking—A review,” in Proc. 3rd Int. Conf. Adv. Comput., Commun. Autom. (ICACCA), 2017, pp. 1–6.

[9] T. S. Brar, “Study and detection of jamming attacks in wireless networks,” unpublished.

[10] M. Dahiya and S. Gill, “Detection of rogue access point in WLAN using Hopfield neural network,” Int. J. Electr. Comput. Eng., vol. 7, no. 2, p. 1060, 2017.

[11] N. Dalal et al., “A wireless intrusion detection system for 802.11 WPA3 networks,” in Proc. 14th Int. Conf. COMSNETS, 2022, pp. 384–392.

[12] J. Kaur, “MAC layer management frame denial of service attacks,” in Proc. Int. Conf. Micro-Electron. Telecommun. Eng. (ICMETE), 2016, pp. 155–160.

[13] A. Kavianpour and M. C. Anderson, “An overview of wireless network security,” in Proc. IEEE 4th Int. Conf. Cyber Secur. Cloud Comput., 2017, pp. 306–309.

[14] H. Khalid et al., “Cybersecurity in Industry 4.0 context: Background, issues, and future directions,” Nine Pillars Technol. Ind., vol. 4, pp. 263–307, 2020.

[15] W. Kim, J. Park, J. Jo, and H. Lim, “Covert jamming using fake ACK frame injection on IEEE 802.11 wireless LANs,” IEEE Wireless Commun. Lett., vol. 8, no. 5, pp. 1502–1505, 2019.

[16] E. Letsoalo and S. Ojo, “Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks,” in Proc. IST-Africa Week Conf., 2016, pp. 1–10.

[17] K. Lounis and M. Zulkernine, “Exploiting race condition for Wi-Fi denial of service attacks,” in Proc. 13th Int. Conf. Security Inf. Netw., 2020, pp. 1–8.

[18] H.-J. Lu and Y. Yu, “Research on WiFi penetration testing with Kali Linux,” Complexity, vol. 2021, 2021.

[19] Y. Ma and H. Ning, “Improvement of EAP authentication method based on RADIUS server,” in Proc. IEEE 18th Int. Conf. Commun. Technol. (ICCT), 2018, pp. 1324–1328.

[20] O. Nakhila, Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks, 2018.

[21] M. Ozkan-Okay et al., “SABADT: Hybrid intrusion detection approach for cyber attacks identification in WLAN,” IEEE Access, vol. 9, pp. 157639–157653, 2021.

[22] H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” arXiv:2101.00292, 2021.

[23] M. Premkumar and T. V. P. Sundararajan, “DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks,” Microprocess. Microsyst., vol. 79, p. 103278, 2020.

[24] Y. Qin et al., “Attack detection for wireless enterprise network: A machine learning approach,” in Proc. IEEE ICSPCC, 2018, pp. 1–6.

[25] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

[26] D. Santoro et al., “A hybrid intrusion detection system for virtual jamming attacks on wireless networks,” Measurement, vol. 109, pp. 79–87, 2017.

[27] K. S. Sathyavani and P. Selvi, “Wireless network security vulnerabilities, threats and countermeasures,” in Proc. Int. Conf. Inf. Image Process., 2014.

[28] E. Sejdić, I. Djurović, and Lj. Stanković, “Fractional Fourier transform as a signal processing tool: An overview,” Signal Process., vol. 91, no. 6, pp. 1351–1369, 2011.

[29] A. D. Seth, S. Biswas, and A. K. Dhar, “De-authentication attack detection using discrete event systems in 802.11 Wi-Fi networks,” in Proc. IEEE ANTS, 2019, pp. 1–6.

[30] A. P. U. Siahaan, WLAN Penetration Examination of the University of Pembangunan Panca Budi, 2016.

[31] G. Singh, “Wireless network components and security protocol,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 4, 2017.

[32] R. R. Singh et al., “Modelling of 802.11 4-way handshake attacks and analysis of security properties,” in Proc. Int. Workshop Secur. Trust Manag., 2020, pp. 3–21.

[33] N. A. Sunday, Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures, Blekinge Inst. Technol., 2008.

[34] S. Suroto, “WLAN security: Threats and countermeasures,” JOIV: Int. J. Informatics Visualization, vol. 2, no. 4, pp. 232–238, 2018.

[35] Z. Tao and A. B. Ruighaver, “Wireless intrusion detection: Not as easy as traditional network intrusion detection,” in Proc. IEEE TENCON, 2005, pp. 1–5.

[36] V. L. L. Thing, “IEEE 802.11 network anomaly detection and attack classification: A deep learning approach,” in Proc. IEEE WCNC, 2017, pp. 1–6.

[37] Y. Tian, S. Wang, and L. Zhang, “CNN-based evil twin attack detection in WiFi networks,” MATEC Web Conf., vol. 336, p. 08006, 2021.

[38] A. S. B. D. A. S. Umesh, “Rogue access point: A threat to wireless society,” unpublished.

[39] M. Vanhoef, D. Schepers, and F. Piessens, “Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing,” in Proc. ACM AsiaCCS, 2017, pp. 360–371.

Additional Files

Published

2024-12-31