Skip to main content

Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges

  • Conference paper
  • First Online:
Next-Generation Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 638))

Abstract

Today, Smartphone device uses are increasing day-by-day such as email, gaming, Internet banking, which requires it to always remain connected with Wi-Fi. This makes it vulnerable to numerous attacks. In this paper, we explore different Smartphone vulnerabilities, malwares, and security challenges. In addition, we also present a classification of various security solutions proposed in the literature. It provides better understanding about current security issues and challenges in Smartphone Wi-Fi access channel, current solution space, and future research direction to protect it from variety of DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dondyk, E., Rivera, L., Zou, C.C.: Wi–Fi access denial of service attack to smartphone. Int. J. Secur. Netw. 8(3), 117–129 (2013)

    Google Scholar 

  2. Wang, Y., Streff, K., Raman, S.: Smartphone security challenges, pp. 52–58 (2012)

    Google Scholar 

  3. Leavitt, N.: Mobile security: finally a serious problem? Computer 11–14 (2011)

    Google Scholar 

  4. Gupta, B.B., Joshi, R.C., Misra, M., Meena, D.L., Shrivastava, G., Sharma, K.: Detecting a wide range of flooding DDoS attacks using linear prediction model. In: IEEE 2nd International Conference on Information and Multimedia Technology (ICIMT 2010), vol. 2, pp. 535–539 (2010)

    Google Scholar 

  5. Li, B., Im, E.G.: Smartphone, promising battlefield for hackers. J. Secur. Eng. 8(1), 89–110 (2011)

    Google Scholar 

  6. Shrivastava, G., Sharma, K., Rai, S.: The detection & defense of DoS & DDos attack: a technical overview. In: International Conference on Computer Engineering and Technology, pp. 274–282, 2010

    Google Scholar 

  7. Wei, T.-E., Mao, C.-H., Jeng, A.B., Lee, H.-M., Wang, H.-T., Wu, D.-J.: Android malware detection via latent network behavior analysis. In: The 2012 International Symposium on Advances in Trusted and Secure Information Systems (TSIS 2012), Liverpool, UK, pp. 1251–1258 (2012)

    Google Scholar 

  8. Husted, N., Saïdi, H., Gehani, A.: Smartphone security limitations: conflicting traditions. In: Proceedings of 2011 Workshop on Governance of Technology, Information, and Policies, ACM, pp. 5–12 (2011)

    Google Scholar 

  9. La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutorials 15(1), 446–471 (2013, First Quarter)

    Google Scholar 

  10. Hadiks, A., et al.: A study of stealthy denial-of-service attacks in Wi-Fi direct device-to-device networks. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 507–508. IEEE (2014)

    Google Scholar 

  11. Ramu, S.: Mobile malware evolution, detection and defence. Term Survey Paper, April 2012. http://blogs.ubc.ca/computersecurity/files/2012/04/SRamu_EECE572_SurveyPaper-SrikanthRamu.pdf

  12. Mancinelli, D.: Public Wi-fi: Friend or Foe?, pp. 1–9 (2014)

    Google Scholar 

  13. Feng, J.L.R., Gong, G.: Vulnerability Analysis and Countermeasures for Wi-Fi-based Location Services and Applications, pp. 1–12 (2014)

    Google Scholar 

  14. Patil, S., Vanjale, S.: A survey on malicious access point detection methods for wireless local area network. Int. J. Comput. Sci. Eng. 2, 22–25 (2014)

    Google Scholar 

  15. Zheng, X., et al. Accurate rogue access point localization leveraging fine-grained channel information. In: 2014 IEEE Conference on Communications and Network Security (CNS). IEEE (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kavita Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, K., Gupta, B.B. (2018). Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges. In: Lobiyal, D., Mansotra, V., Singh, U. (eds) Next-Generation Networks. Advances in Intelligent Systems and Computing, vol 638. Springer, Singapore. https://doi.org/10.1007/978-981-10-6005-2_56

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6005-2_56

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6004-5

  • Online ISBN: 978-981-10-6005-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics