DoS Attacks On Wireless Voice Over IP Systems. By Brendon Wesley Supervisor- Noria Foukia. Abstract. As converged wireless networks become increasingly widespread, there is an assumption that such systems now have strong confidentiality and reliability.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
By Brendon Wesley
Supervisor- Noria Foukia
N.B - Paper Address other QoS considerations in the 802.11 specification. (MAC layer of 802.11)
1-Unauthenticated and Unassociated.
2-Authenticated and unassociated.
3-Authenticated and associated.
A de authentication frame will also disassociate the station. This is because a client cannot be associated without being authenticated as specified by one of the three rules above. This message can be used by an attacker masquerading as either the client or AP and send one of these frames by spoofing the Source Address of the device. The client or AP will immediately discontinue communication with the other.