University of Bahrain
Scientific Journals

Securing the Airwaves: A Comprehensive Survey on De-authentication Attacks and Mitigation Strategies

Show simple item record

dc.contributor.author Gulab Gaikwad, Adwait
dc.contributor.author Patil, Balaji
dc.date.accessioned 2024-02-11T09:28:25Z
dc.date.available 2024-02-11T09:28:25Z
dc.date.issued 2024-02-09
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5431
dc.description.abstract Wi-Fi networks, crucial for modern communication, are confronted with an escalating array of security challenges. Notably, de-authentication attacks emerge as formidable threats, involving the unauthorized expulsion of legitimate users from a Wi-Fi network. These attacks disrupt communication and may lead to unauthorized access by exploiting vulnerabilities in the communication protocols governing Wi-Fi networks. The susceptibility of these networks to malicious interference extends beyond disrupting communication; it poses a significant risk to the integrity of authentication methodologies, potentially facilitating unauthorized access. /In the context of the Internet of Things (IoT), where seamless and secure connectivity is paramount, the implications of de-authentication attacks become particularly severe. This paper delves into a comprehensive analysis of de-authentication attacks, meticulously dissecting their various types and the resultant impact on wireless communication protocols, authentication methodologies, and the overall security posture of IoT devices. The exploration culminates in a forward-looking discussion, contemplating future trends and emerging threats within the Wi-Fi security landscape. This forward-looking perspective aims to provide valuable insights to guide ongoing efforts in fortifying wireless networks against the ever-evolving landscape of cyber challenges. As technology advances, understanding and mitigating such security risks remain imperative for ensuring the robustness and reliability of Wi-Fi networks in the face of emerging cyber threats. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject De-authentication, Mitigation Techniques, Wireless Networking, IoT Security. en_US
dc.title Securing the Airwaves: A Comprehensive Survey on De-authentication Attacks and Mitigation Strategies en_US
dc.identifier.doi 10.12785/ijcds/xxxxxx
dc.volume 15 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 9 en_US
dc.contributor.authorcountry Kothrud, India en_US
dc.contributor.authorcountry Kothrud, India en_US
dc.contributor.authoraffiliation Department of Computer Engineering and Technology, MIT-World Peace University en_US
dc.contributor.authoraffiliation Department of Computer Engineering and Technology, MIT-World Peace University en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account