{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T11:10:40Z","timestamp":1778757040084,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811303951","type":"print"},{"value":"9789811303968","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0396-8_13","type":"book-chapter","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T11:29:09Z","timestamp":1528543749000},"page":"241-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Security Attacks on Wireless Networks and Their Detection Techniques"],"prefix":"10.1007","author":[{"given":"Rizwan Ur","family":"Rahman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepak Singh","family":"Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"13_CR1","unstructured":"Pahlavan, K. (2011). Principles of wireless networks: A unified approach. John Wiley & Sons, Inc."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Welch, D., & Lathrop, S. (2003, June). Wireless security threat taxonomy. In Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society (pp. 76\u201383). IEEE.","DOI":"10.1109\/SMCSIA.2003.1232404"},{"key":"13_CR3","unstructured":"Nicopolitidis, P., Pomportsis, A. S., Papadimitriou, G. I., & Obaidat, M. S. (2003). Wireless networks. John Wiley & Sons, Inc."},{"key":"13_CR4","unstructured":"Cali, F., Conti, M., & Gregori, E. (2000). IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism. IEEE journal on selected areas in communications, 18(9), 1774\u20131786."},{"key":"13_CR5","unstructured":"Forouzan, B. A. (2002). TCP\/IP protocol suite. McGraw-Hill, Inc."},{"key":"13_CR6","unstructured":"Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and practice (Vol. 6). London: Pearson."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Shivaraj, G., Song, M., & Shetty, S. (2008, November). A hidden Markov model based approach to detect rogue access points. In Military communications conference, 2008. MILCOM 2008. IEEE (pp. 1\u20137). IEEE.","DOI":"10.1109\/MILCOM.2008.4753358"},{"key":"13_CR8","unstructured":"Gast, M. (2005). 802.11 wireless networks: the definitive guide. \u201cO\u2019Reilly Media, Inc.\u201d."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Stubblefield, A., Ioannidis, J., & Rubin, A. D. (2004). A key recovery attack on the 802.11 b wired equivalent privacy protocol (WEP). ACM transactions on information and system security (TISSEC), 7(2), 319\u2013332.","DOI":"10.1145\/996943.996948"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Khabbazian, M., Mercier, H., & Bhargava, V. K. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736\u2013745.","DOI":"10.1109\/TWC.2009.070536"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Berghel, H. (2004). Wireless infidelity I: War driving. Communications of the ACM, 47(9), 21\u201326.","DOI":"10.1145\/1015864.1015879"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Lawrence, E., & Lawrence, J. (2004, April). Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalking. In Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on (Vol. 2, pp. 268\u2013273). IEEE.","DOI":"10.1109\/ITCC.2004.1286645"},{"key":"13_CR13","unstructured":"McNab, C. (2007). Network security assessment: know your network. \u201cO\u2019Reilly Media, Inc.\u201d."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kanawat, S. D., & Parihar, P. S. (2011). Attacks in wireless networks. International Journal of smart sensors and Ad Hoc Networks, 1(1), 113\u20136.","DOI":"10.47893\/IJSSAN.2011.1033"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Kizza, J. M. (2009). Guide to computer network security (pp. 2007\u20132008). Springer.","DOI":"10.1007\/978-1-84800-917-2"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Meng, K., Xiao, Y., & Vrbsky, S. V. (2009). Building a wireless capturing tool for WiFi. Security and Communication Networks, 2(6), 654\u2013668.","DOI":"10.1002\/sec.107"},{"key":"13_CR17","unstructured":"Bellardo, J., & Savage, S. (2003, August). 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In USENIX security symposium (Vol. 12, pp. 2\u20132)."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sun, Y. Q., Wang, X. D., & Zhou, X. M. (2012). Jamming attacks in wireless network. Ruanjian Xuebao\/Journal of Software, 23(5), 1207\u20131221.","DOI":"10.3724\/SP.J.1001.2012.04059"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Richards, K. (1999). Network based intrusion detection: a review of technologies. Computers & Security, 18(8), 671\u2013682.","DOI":"10.1016\/S0167-4048(99)80131-X"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, S. (2007, July). Smurf-based distributed denial of service (ddos) attack amplification in internet. In Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on (pp. 25\u201325). IEEE.","DOI":"10.1109\/ICIMP.2007.42"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Hwang, H., Jung, G., Sohn, K., & Park, S. (2008, January). A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP. In Information Science and Security, 2008. ICISS. International Conference on (pp. 164\u2013170). IEEE.","DOI":"10.1109\/ICISS.2008.10"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Hole, K. J., Dyrnes, E., & Thorsheim, P. (2005). Securing wi-fi networks. Computer, 38(7), 28\u201334.","DOI":"10.1109\/MC.2005.241"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Lashkari, A. H., Danesh, M. M. S., & Samadi, B. (2009, August). A survey on wireless security protocols (WEP, WPA and WPA2\/802.11 i). In Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on (pp. 48\u201352). IEEE.","DOI":"10.1109\/ICCSIT.2009.5234856"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Tews, E., & Beck, M. (2009, March). Practical attacks against WEP and WPA. In Proceedings of the second ACM conference on Wireless network security (pp. 79\u201386). ACM.","DOI":"10.1145\/1514274.1514286"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, R., & Preneel, B. (2017, January). On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. In International Conference on emerging Networking EXperiments and Technologies-CoNEXT 2017. ACM.","DOI":"10.1145\/3143361.3143389"},{"key":"13_CR26","unstructured":"Nadal, M. (2017). Critical mining, Blockchain and Bitcoin in contemporary art."},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., & Vanbever, L. (2017, May). Hijacking Bitcoin: Routing attacks on cryptocurrencies. In Security and Privacy (SP), 2017 IEEE Symposium on (pp. 375\u2013392). IEEE.","DOI":"10.1109\/SP.2017.29"},{"key":"13_CR28","unstructured":"Lin, I. C., & Liao, T. C. (2017). A Survey of Blockchain Security Issues and Challenges. IJ Network Security, 19(5), 653\u2013659."},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Putman, C. G. J. (2017). Business Model of Botnets.","DOI":"10.1109\/PDP2018.2018.00077"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Heartfield, R., Loukas, G., & Gan, D. (2017). An eye for deception: A case study in utilising the Human-As-A-Security-Sensor paradigm to detect zero-day semantic social engineering attacks.","DOI":"10.1109\/SERA.2017.7965754"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Berghel, H. (2017). A Quick Take on Windows Security Evolution. Computer, 50(5), 120\u2013124.","DOI":"10.1109\/MC.2017.136"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Y., & Yang, J. (2017, March). Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool. In Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on (pp. 110\u2013113). IEEE.","DOI":"10.1109\/WAINA.2017.39"},{"key":"13_CR33","unstructured":"Shirazi, H., Hadavi, M. A., & Hamishagi, V. S. Vulnerability Prevention in Software Development Process."},{"key":"13_CR34","unstructured":"Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 ."},{"key":"13_CR35","unstructured":"Pleskonjic, D. (2003, December). Wireless intrusion detection systems (WIDS). In 19th Annual Computer Security Applications Conference."},{"key":"13_CR36","unstructured":"Timofte, J. (2008). Wireless intrusion prevention systems. Revista Informatica Economica, 47(3), 129\u2013132."},{"key":"13_CR37","doi-asserted-by":"crossref","unstructured":"Gjomemo, R., Malik, H., Sumb, N., Venkatakrishnan, V. N., & Ansari, R. (2014, March). Digital check forgery attacks on client check truncation systems. In International conference on financial cryptography and data security (pp. 3\u201320). Springer, Berlin, Heidelberg.","DOI":"10.1007\/978-3-662-45472-5_1"}],"container-title":["Emerging Wireless Communication and Network Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0396-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T01:51:51Z","timestamp":1751680311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0396-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811303951","9789811303968"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0396-8_13","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}