Abstract

Wireless network communication is an enormous and vast area of research. Many companies and organizations, related to wireless security have struggled due to the narrow, limited, and restricted access to the legitimate network. In a simplistic sense and most common manner, radio frequency (RF) is used for data communication on a network without wires. By its nature and methodology, wireless communication uses an air interface, and hence, it is vulnerable to attackers or hackers who can leverage these things and will compromise the legitimate network, devices, servers, applications, databases, and connected users. Wireless network attacks can be categorised into various types named Distributed Denial of Service (DDoS), Evil-twin, Man-in-the-Middle (MITM), Wireless Fidelity (Wi-Fi) Deauthentication, and Internet of Things (IoT)-based attacks. These types of attacks can compromise and infect the operational technology of large-scale public and private sector organizations' Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA). A wireless rogue access point has already done harmful things to businesses of all sizes, not just coffee shops, airport terminals, tube stations, or public gardens. This paper classifies rogue access points (RAPs) in wireless communication as a serious threat to the Wireless Local Area Network (WLAN) 802.11 protocol. The aim is to classify various types of wireless attacks and their various techniques, which are especially performed through RAP successfully. This paper also presents the statistical data and literature survey based on demand of next generation Wi-Fi enabled technologies and related cyber threats, which show that RAP is a serious threat to legitimate networks for wireless network and communication.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call