Adversarial Attacks and Mitigation Strategies on WiFi Networks
Discuss this preprint
Start a discussion What are Sciety discussions?Listed in
This article is not in any list yet, why not save it to one of your lists.Abstract
The ubiquity of WiFi networks has paralleled a surge in adversar-ial attacks aimed at compromising their integrity and security. This re-view systematically examines the state-of-the-art attack models targetingWiFi routers, elucidating the methodologies adversaries employ to exploitvulnerabilities in wireless communications. We delve into the taxonomyof network attack vectors, including denial-of-service (DoS), man-in-the-middle (MitM), and key reinstallation attacks, thereby highlighting theirimplications on confidentiality, integrity, and availability. Furthermore,we provide a comprehensive overview of contemporary mitigation strate-gies, emphasizing both proactive and reactive mechanisms designed tofortify network infrastructures against such exploits. By synthesizing re-cent advancements in encryption protocols, anomaly detection systems,and machine learning algorithms, this review aims to inform future re-search directions and practical applications in enhancing WiFi networksecurity.