{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:41:51Z","timestamp":1760074911102,"version":"build-2065373602"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185905","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"548-552","source":"Crossref","is-referenced-by-count":0,"title":["Generating False Handshakes: A Modern Honeypot Strategy for Wi-Fi Network Protection"],"prefix":"10.1109","author":[{"given":"Roman","family":"Banakh","sequence":"first","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]},{"given":"Taras","family":"Popovych","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Information Technology Security,Lviv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ecai52376.2021.9515048"},{"article-title":"An approach on cracking WPA,WPA2 security of Wi-Fi with handshake attack","volume-title":"7th Annual Paper Meet of Mechanical Engineering (APMME) 2023","author":"Shahadat","key":"ref2"},{"key":"ref3","first-page":"34","article-title":"Vulnerabilities of Wireless Security protocols (WEP and WPA2)","volume":"1","author":"Kumkar","year":"2012","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2015.7357520"},{"article-title":"Self-Protective Behaviors Over Public WiFi Networks","volume-title":"The LASER Workshop: Learning from Authoritative Security Experiment","author":"Maimon","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7110284"},{"article-title":"Reduced Side Channel Timing Attack in Dragonfly Handshake of WPA3 for MODP Group","year":"2020","author":"Barai","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.32628\/cseit1953127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.043"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ukrmico.2017.8095429"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.11591\/ijict.v10i2.pp85-92"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15587\/1729-4061.2023.282131"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/data9100119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/idaacs-sws.2018.8525538"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91008-6_47"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tcset.2016.7452093"},{"key":"ref17","first-page":"48","article-title":"Study of Honeypots: Analysis of WiFi_Honeypots and Honeypots tools","volume":"8","author":"Shanmugam","year":"2014","journal-title":"Advances in Natural and Applied Sciences"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/acit62333.2024.10712586"},{"volume-title":"skickar, ESP8266_Router_Honeypot, GitHub repository","key":"ref19"},{"article-title":"WiSE: Wireless Internet Sensing Environment","year":"2012","author":"Fairhurst","key":"ref20"},{"volume-title":"fakeAP, GitHub repository","author":"McInerney","key":"ref21"},{"article-title":"HoneySpot: The Wireless Honeypot Monitoring the Attacker\u2019s Activities in Wireless Networks","year":"2007","author":"Siles","key":"ref22"},{"key":"ref23","first-page":"48","article-title":"Study of Honeypots: Analysis of WiFi_Honeypots and Honeypots tools","volume":"8","author":"Shanmugam","year":"2014","journal-title":"Advances in Natural and Applied Sciences"},{"key":"ref24","article-title":"OpenWRT \u2013 Wireless Freedom"},{"author":"Malinen","key":"ref25","article-title":"hostapd: IEEE 802.11 AP, IEEE 802.1X\/WPA\/WPA2\/EAP\/RADIUS Authenticator"},{"key":"ref26","article-title":"Wireshark \u2013 Network Protocol Analyzer"},{"key":"ref27","article-title":"TCPDump & Libpcap"},{"key":"ref28","article-title":"Aircrack-ng: WiFi Security Auditing Tools Suite"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03582-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/e20050312"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185905.pdf?arnumber=11185905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:05:52Z","timestamp":1760072752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185905","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}