Wireless Threats and Attacks

Robert J. Boncella, Washburn University

Introduction

Wireless Security Requirements

Threats

Vulnerabilities

Taxonomy of Attacks

Attacks against Wireless Networks

Against 802.11 Networks

Active Attacks

Against Bluetooth Networks

Against Handheld Devices

Summary

Glossary

Cross References

References

Further Reading

INTRODUCTION

Wireless Security Requirements

The security requirements for wireless devices are the same as for wired devices. The minimal requirements for communication security are confidentiality, integrity, and availability. This is sometimes referred to as the CIA requirement.

Confidentiality is keeping your secrets secret. Attackers who try to break confidentiality are trying to find out something that you don't want them to know.

Integrity is making sure that your data are what they are supposed to be. Someone who changes or destroys data compromises integrity.

Availability is the property that allows people to get at the data they need when they need it. Denial of service (DoS) attacks that try to bring a network or server down are attacks on availability.

A secure communication channel will ensure these requirements. In addition, wireless communication security should include techniques that allow for the authentication of both the sender and receivers of a message and techniques by which nonrepudiation of a message is guaranteed.

An attack on a wireless network is an attempt to exploit a particular vulnerability or number of vulnerabilities ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.