Adversarial Attacks and Mitigation Strategies on WiFi Networks

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

The ubiquity of WiFi networks has paralleled a surge in adversar-ial attacks aimed at compromising their integrity and security. This re-view systematically examines the state-of-the-art attack models targetingWiFi routers, elucidating the methodologies adversaries employ to exploitvulnerabilities in wireless communications. We delve into the taxonomyof network attack vectors, including denial-of-service (DoS), man-in-the-middle (MitM), and key reinstallation attacks, thereby highlighting theirimplications on confidentiality, integrity, and availability. Furthermore,we provide a comprehensive overview of contemporary mitigation strate-gies, emphasizing both proactive and reactive mechanisms designed tofortify network infrastructures against such exploits. By synthesizing re-cent advancements in encryption protocols, anomaly detection systems,and machine learning algorithms, this review aims to inform future re-search directions and practical applications in enhancing WiFi networksecurity.

Article activity feed