University of Bahrain
Scientific Journals

Securing the Airwaves: A Survey on De-authentication Attacks and Mitigation Strategies

Show simple item record

dc.contributor.author Gulab Gaikwad, Adwait
dc.contributor.author Patil, Balaji
dc.date.accessioned 2024-02-11T09:28:25Z
dc.date.available 2024-02-11T09:28:25Z
dc.date.issued 2024-02-09
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/5431
dc.description.abstract Wi-Fi networks, crucial for modern communication, are confronted with an escalating array of security challenges. Notably, de-authentication attacks emerge as formidable threats, involving the unauthorized expulsion of legitimate users from a Wi-Fi network. These attacks disrupt communication and may lead to unauthorized access by exploiting vulnerabilities in the communication protocols governing Wi-Fi networks. The susceptibility of these networks to malicious interference extends beyond disrupting communication; it poses a significant risk to the integrity of authentication methodologies, potentially facilitating unauthorized access. In the context of the Internet of Things (IoT), where seamless and secure connectivity is paramount, the implications of de-authentication attacks become particularly severe. This paper delves into a comprehensive analysis of de-authentication attacks, meticulously dissecting their various types and the resultant impact on wireless communication protocols, authentication methodologies, and the overall security posture of IoT devices. The study aims to analyze the growing threat of de-authentication attacks on Wi-Fi networks and their implications for the security of Internet of Things (IoT) devices. By employing a comprehensive methodology, we conducted an in-depth examination of various types of de-authentication attacks and their impact on wireless communication protocols and authentication methodologies. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject De-authentication, Mitigation Techniques, Wireless Networking, IoT Security. en_US
dc.title Securing the Airwaves: A Survey on De-authentication Attacks and Mitigation Strategies en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/160196
dc.volume 16 en_US
dc.issue 1 en_US
dc.pagestart 1307 en_US
dc.pageend 1316 en_US
dc.contributor.authorcountry India en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation Department of Computer Engineering and Technology, MIT-World Peace University en_US
dc.contributor.authoraffiliation Department of Computer Engineering and Technology, MIT-World Peace University en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account