Research Article

[Retracted] Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique

Table 1

Related work categorization by techniques.

YearRef. no.Research method/techniqueDomainDescription

2021[55]Security modelWireless networkAnalyses a new physical layer security strategy to improve wireless communication security against eavesdroppers
2020[56]Security modelWi-fi network securityProposes a model for small and medium-sized businesses by identifying and analyzing security measures in businesses
2018[57]Empirical analysisWireless networkEmploys empirical data to map wi-fi hotspots in metropolitan areas to operationalize the virtual component of urban vibrancy
2019[58]SurveyWi-fi securityDescribes the fundamentals of wi-fi security problems to raise awareness
2014[59]Experimental procedureNetwork securityUses a correlation coefficient-based learning method to find problems in WLAN
2014[60]ReviewWi-fi securityConsiders the remote security threats to current wireless systems and standards, including WEP, WPA, and WPA 2. (WPA2).
2021[4]ReviewWi-fi securityEnables visualizing the numerous factors required in wi-fi wireless network security
2018[51]WardrivingWi-fiAssists in comprehending a low-cost technique for acquiring information about wi-fi distribution in a variety of locations
2021[61]WardrivingWi-fi securityProposes a standalone python-based programme for assessing the vulnerability of wardriving-captured access points (APs)
2021[62]Penetration testingWi-fi securityPresents a kAli linux-based wi-fi penetration testing technique
2021[63]WardrivingWi-fi securityAnalyses the results of evaluating the security of a wireless network on raspberry pi running kAli linux
2021[36]SurveyWi-fi securityExamines the possibilities for integrity, availability, and confidentiality and also analyses most WLAN packet services and technologies, revealing safety
2020[64]War-flyingCyber securityDesigns a system for using a drone to capture and map unauthorized 2.4 GHz and 5 GHz wireless network access points in mission-critical infrastructure, then converting the data to a map view
2019[65]SurveyNetwork securityHighlights the prospective risk and forms of network security attacks, as well as shedding light on existing preventative approaches and making realistic ideas for their enhancement
2019[66]WardrivingWi-fi securityProvides a method for identifying rouge access points based on a set of static properties chosen from a well-conducted experiment on real-world locations
2018[67]Multi-parameter frameworkWLAN securityImproves rouge access point detection in WLAN by using a multi-parameter-based approach
2021[68]War flyingWLAN securityEvaluate wireless networks drone system (warflying) that detects and analyses information such as access point locations, MAC, authentication, power, privacy, and encryption settings
2020[69]SurveyWi-fi network securityExamines wireless technologies and the security vulnerabilities that these technologies offer to larger communication networks
2017[70]SurveyWi-fi securityFocuses on developing solutions for mitigating cyber-attacks and examines the hazards associated with utilizing wireless devices to offer Internet service in open access zones
2021[71]ReviewWireless network securityExplores the worldwide implications of growing wireless network technologies and cyber security concerns and suggests some recommended remedies
2021[72]Wi-fi protocol modelWi-fi securityProvides a model for detecting wi-fi protocol attacks with low false positives and varied low rates of false negatives for various attacks
2021[61]Analysis toolWireless access point securityA python language-based tool is proposed and implemented as a standalone tool for assessing an access Point’s vulnerability