[HTML][HTML] Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review

M Thankappan, H Rifà-Pous, C Garrigues - Expert Systems with …, 2022 - Elsevier
Abstract Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of
manipulating encrypted wireless frames between two legitimate endpoints. Since its …

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd

M Vanhoef, E Ronen - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
The WPA3 certification aims to secure home networks, while EAP-pwd is used by certain
enterprise Wi-Fi networks to authenticate users. Both use the Dragonfly handshake to …

Intelligent buildings in smart grids: A survey on security and privacy issues related to energy management

A Llaria, J Dos Santos, G Terrasson, Z Boussaada… - Energies, 2021 - mdpi.com
During the last decade, the smart grid (SG) concept has started to become a reality, mainly
thanks to the technical progress achieved in telecommunications, informatics and power …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

[HTML][HTML] How is your Wi-Fi connection today? DoS attacks on WPA3-SAE

E Chatzoglou, G Kambourakis, C Kolias - Journal of Information Security …, 2022 - Elsevier
WPA3-Personal renders the Simultaneous Authentication of Equals (SAE) password-
authenticated key agreement method mandatory. The scheme achieves forward secrecy …

A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

Work experience as a factor in cyber-security risk awareness: A survey study with university students

T Pósa, J Grossklags - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
The emergence of the COVID-19 pandemic in early 2020 has transformed how individuals
work and learn and how they can apply cyber-security requirements in their, mostly remote …

Wireless Security Protocols WPA3: A Systematic Literature Review

A Halbouni, LY Ong, MC Leow - IEEE Access, 2023 - ieeexplore.ieee.org
The size of wireless networks and the number of wireless devices are growing daily. A
crucial part of wireless security involves preventing unauthorized access by using wireless …

[Retracted] Assessment and Test‐case Study of Wi‐Fi Security through the Wardriving Technique

VO Etta, A Sari, AL Imoize, PK Shukla… - Mobile Information …, 2022 - Wiley Online Library
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its
applicability as a 21st‐century business tool and its survivability in a security threat‐infested …

Wireless encryption and WPA2 weaknesses

K Moissinac, D Ramos, G Rendon… - 2021 IEEE 11th Annual …, 2021 - ieeexplore.ieee.org
Encryption is prevalent in many forms of modern communications. Still, wireless
communications security holds higher priority since any device can easily intercept the data …