This preview shows page 1. Sign up to view the full content.
Unformatted text preview: the help of this information can carry out attacks such as: Timing attacks De-authentication attacks De-association attacks Power Depletion attacks (without scan reports, aggregation of such information might require huge amount of data) One could also stage the evil-twin attack. 5) a. See Notes (slides 48, 48, etc., 802.11 Architecture lecture on 2/10/10) b. See Notes c. See Notes d. See Notes. From the point of view of the sending and the receiving stations CA and CD differ as CA is carried out at the transmitting station whereas CD is carried out at the receiving end. 6) See Notes (slides 87, 88, etc., 802.11 WEP lecture on 2/01/10) Also, refer to the following link http://www.isoc.org/isoc/conferences/ndss/02/papers/stubbl.pdf 7) See Notes (Slides 74, 75 from 802.11 Architecture lecture on 2/01/10) 8) See Notes (Slide 6 of 802.11i lecture on 2/08/10) 9) See Notes (See lectures 802.11i and Radius)...
View Full Document
This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.
- Fall '10