dc.contributor.author |
Gulab Gaikwad, Adwait |
|
dc.contributor.author |
Patil, Balaji |
|
dc.date.accessioned |
2024-02-11T09:28:25Z |
|
dc.date.available |
2024-02-11T09:28:25Z |
|
dc.date.issued |
2024-02-09 |
|
dc.identifier.issn |
2210-142X |
|
dc.identifier.uri |
https://journal.uob.edu.bh:443/handle/123456789/5431 |
|
dc.description.abstract |
Wi-Fi networks, crucial for modern communication, are confronted with an escalating array of security challenges. Notably,
de-authentication attacks emerge as formidable threats, involving the unauthorized expulsion of legitimate users from a Wi-Fi network.
These attacks disrupt communication and may lead to unauthorized access by exploiting vulnerabilities in the communication protocols
governing Wi-Fi networks. The susceptibility of these networks to malicious interference extends beyond disrupting communication;
it poses a significant risk to the integrity of authentication methodologies, potentially facilitating unauthorized access. /In the context
of the Internet of Things (IoT), where seamless and secure connectivity is paramount, the implications of de-authentication attacks
become particularly severe. This paper delves into a comprehensive analysis of de-authentication attacks, meticulously dissecting their
various types and the resultant impact on wireless communication protocols, authentication methodologies, and the overall security
posture of IoT devices. The exploration culminates in a forward-looking discussion, contemplating future trends and emerging threats
within the Wi-Fi security landscape. This forward-looking perspective aims to provide valuable insights to guide ongoing efforts in
fortifying wireless networks against the ever-evolving landscape of cyber challenges. As technology advances, understanding and
mitigating such security risks remain imperative for ensuring the robustness and reliability of Wi-Fi networks in the face of emerging
cyber threats. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University of Bahrain |
en_US |
dc.subject |
De-authentication, Mitigation Techniques, Wireless Networking, IoT Security. |
en_US |
dc.title |
Securing the Airwaves: A Comprehensive Survey on De-authentication Attacks and Mitigation Strategies |
en_US |
dc.identifier.doi |
10.12785/ijcds/xxxxxx |
|
dc.volume |
15 |
en_US |
dc.issue |
1 |
en_US |
dc.pagestart |
1 |
en_US |
dc.pageend |
9 |
en_US |
dc.contributor.authorcountry |
Kothrud, India |
en_US |
dc.contributor.authorcountry |
Kothrud, India |
en_US |
dc.contributor.authoraffiliation |
Department of Computer Engineering and Technology, MIT-World Peace University |
en_US |
dc.contributor.authoraffiliation |
Department of Computer Engineering and Technology, MIT-World Peace University |
en_US |
dc.source.title |
International Journal of Computing and Digital Systems |
en_US |
dc.abbreviatedsourcetitle |
IJCDS |
en_US |