Investigation of vulnerabilities and security threats of the IEEE 802.11 standard
Journal Title: Modern Innovations, Systems and Technologies - Year 2023, Vol 3, Issue 3
Abstract
This article delves into an in investigation of vulnerabilities and security threats associated with the widely used IEEE 802.11 standard, commonly known as Wi-Fi. Wireless networking is one of the most exciting developments in the world of networking. Since the introduction of IEEE 802.11 Ethernet, Wi-Fi has become the most widely adopted wireless networking technology. Because wireless networks are easy to deploy and upgrade, and decent data rates are now available at low cost, their adoption is growing everywhere. Organizations and enterprises are moving from traditional wired networks to wireless networks. Wireless networks can perform a variety of functions, from simple extension to a distribution point. One of the major disadvantages of wireless networks is that wireless networking devices do not provide security as delivered. By analyzing various attack vectors and potential weaknesses, the study aims to provide a comprehensive understanding of the security landscape surrounding this standard. The research identifies potential risks to wireless networks, explores potential exploits, and offers insights into countermeasures to enhance the protection of IEEE 802.11-based systems against evolving security challenges.
Authors and Affiliations
A. Yu. Mordvinova, S. A. Nuriev
Morphology of particles and X-ray spectral microanalysis of particles of ore material of ferromanganese ore from the Lena ore field of the Republic of Sakha (Yakutia) reduced in a hydrogen medium
The paper studies X-ray spectral microanalysis of particles of ore material of ferromanganese ore from the Lena ore field of the Republic of Sakha (Yakutia) reduced in a medium with hydrogen. The morphology of the partic...
System analysis of the subject area and creation of an up-to-date model of the database "Scientific activity of university students"
In this article, the authors describe the main stages of building an up-to-date database model, analyze the subject area "Scientific activity of university students". Based on the analysis, the requirements for the devel...
Analysis of algorithms for detecting breast cancer using medical imaging
This article is dedicated to modern methods of image detection and analysis. It discusses the SSD (Single Shot Multibox Detector) algorithm, which allows the detection of multiple objects in an image, as well as advanced...
To plant molluscocide production technology
Currently, the vast range of helminthoses of farm fish and animals is causing significant economic damage. Effective prevention is an important element in the fight against these diseases. An effective method of preventi...
Mobile application for neuropsychological games using computer vision methods
In today's world, virtual platforms are becoming increasingly important tools for enhancing cognitive performance and maintaining brain health. Neuropsychological software and hardware systems represent an innovative and...