{"created":"2020-09-01T12:58:27.378981+00:00","id":3457,"links":{},"metadata":{"_buckets":{"deposit":"e65d920f-665e-4f63-805c-31a09d09cec0"},"_deposit":{"id":"3457","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3457"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3457","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"IEEE 802.11 Attacks and Defenses","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand availability. Possible threats come fromvulnerabilities of security protocols. The rapidgrowth in the use of wireless networks attracts theattackers as a target. Wireless traffic consists ofmanagement, control and data frames. An attackercan manipulate these frames that affect the dataintegrity, confidentiality, authentication andavailability. A real Wireless Local Area (WLAN)testbed setup is proposed for performing thevulnerabilities of well-known attacks pertaining toIEEE 802.11 network and monitoring the analysis ofpackets. Based on these categories of vulnerabilitiesand threats, Confidentiality Attack: Evil TwinAvailability Attacks: Deauthentication Disassociationand Café Latte and Authentication Attack: Dictionaryattack are conducted through demonstrations in areal environment by using proposed setup."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"IEEE 802.11"},{"interim":"Media Access Control (MAC)"},{"interim":"DoS"},{"interim":"Disassociation"},{"interim":"Deauthentation"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-23"}],"displaytype":"preview","filename":"ICCA 2019 Proceedings Book-pages-197-202.pdf","filesize":[{"value":"692 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3457/files/ICCA 2019 Proceedings Book-pages-197-202.pdf"},"version_id":"56e4cf1d-e845-4440-bcbe-f82a57130db3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Seventeenth International Conference on Computer Applications(ICCA 2019)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, May Aye Chan"},{"subitem_authors_fullname":"Thant, Khin Phyo"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-02-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1205"},"item_title":"IEEE 802.11 Attacks and Defenses","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-23","publish_status":"0","recid":"3457","relation_version_is_last":true,"title":["IEEE 802.11 Attacks and Defenses"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:55:20.183247+00:00"}