Please wait a minute...
Computer & Telecommunication  2019, Vol. 1 Issue (5): 48-50    DOI:
Current Issue | Archive | Adv Search |
Man-in-the-middle Attack and Defense Methods in Wireless Networks
JIANG Lin-zhou
Chengdu NO.7 High School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Nowadays, Wi-Fi and cellular mobile network have become universal, so wireless network security is becoming more and more important. At present, the Man-in-the-the-Middle Attack on the wireless network has existed in a large amount, and it is also an attack means with a great threat. This paper discusses on the Man-in-the-the-Middle Attack of the wireless network from the aspects of the technical principle, the attack mode, and the defense methods.
Key words wireless network security      Man-in-the-Middle Attack      defense     
Published: 12 August 2019
ZTFLH:  TN92  

Cite this article:

JIANG Lin-zhou. Man-in-the-middle Attack and Defense Methods in Wireless Networks. Computer & Telecommunication, 2019, 1(5): 48-50.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2019/V1/I5/48

[1] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[2] ChenWenyao. IDC Security Construction Strategy for Telecom Carriers[J]. 电脑与电信, 2017, 1(9): 27-29.
[3] Liu Dabao, Zhang Yi, Tang Yong. Research on the Key Technologies of Computer Network Defense Policy Refinement[J]. 电脑与电信, 2016, 1(7): 71-73.
[4] Meng Lingbo. Security Testing and Analysis of Attack and Defense in Local Area Network[J]. 电脑与电信, 2015, 1(9): 45-46.
[5] Chen Liangliang, Chen Ketang. The Development of Towers Defense of the Three Kingdoms·Shu Based on the Cocos2D-X Engine[J]. 电脑与电信, 2015, 1(6): 37-39.
[6] Hu Chun. Construction and Implementation of Campus Network Security Defense System[J]. 电脑与电信, 2015, 1(1-2): 27-28.
[7] Cai juan. The Attack and Prevention of ARP[J]. , 2011, 1(07): 0-0.
[8] Liu Yi. Research of P2P Technology Base on Public Information Security[J]. , 2011, 1(05): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd