Laboratory Exercises for Wireless Network Attacks and Defenses
نویسندگان
چکیده
ISBN 1-933510-99-4 / 2010 CISSE Abstract With the increase of information security programs and curricula, a number of laboratory experiments or exercises, laboratory-based courseware or courses have been developed for information security education. While most of the existing laboratory exercises/experiments focus on security issues in a wired network, this paper describes a series of laboratory exercises we’ve developed for demonstrating wireless network attacks and defenses using common open source tools. These laboratory exercises demonstrate the following concepts or methods: wardriving, eavesdropping, WEP key cracking/decryption, Man in the Middle, ARP cache poisoning, MAC spoofing and defense techniques of some of the attacks. The goal of these exercises is to help students learn through exploring, or playing with the real system. These laboratory exercises can be used in an introductory network security or computer networks class. Our classroom experiences of teaching these laboratory exercises are also reported in this paper. Our future work includes exploring more ways to conduct these laboratory exercises effectively, and design comprehensive laboratory exercises that require the students to combine various wireless network attack and defense techniques.
منابع مشابه
Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملDOS Attacks and Defenses at the Network Layer in AD-HOC and Sensor Wireless Networks, Wireless AD-HOC Sensor Networks: A Short Survey
Adhoc and sensor wireless networks are challenging and promising field for researchers. These networkingtechnology are not only significant on science and engineering but important on a broad range of applications such as critical infrastructure protection and security, disaster relief operations, biodiversity mapping, medicine and healthcare etc. Wireless Sensor Network applications require Wi...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل