|
Year | Ref. no. | Research method/technique | Domain | Description |
|
2021 | [55] | Security model | Wireless network | Analyses a new physical layer security strategy to improve wireless communication security against eavesdroppers |
2020 | [56] | Security model | Wi-fi network security | Proposes a model for small and medium-sized businesses by identifying and analyzing security measures in businesses |
2018 | [57] | Empirical analysis | Wireless network | Employs empirical data to map wi-fi hotspots in metropolitan areas to operationalize the virtual component of urban vibrancy |
2019 | [58] | Survey | Wi-fi security | Describes the fundamentals of wi-fi security problems to raise awareness |
2014 | [59] | Experimental procedure | Network security | Uses a correlation coefficient-based learning method to find problems in WLAN |
2014 | [60] | Review | Wi-fi security | Considers the remote security threats to current wireless systems and standards, including WEP, WPA, and WPA 2. (WPA2). |
2021 | [4] | Review | Wi-fi security | Enables visualizing the numerous factors required in wi-fi wireless network security |
2018 | [51] | Wardriving | Wi-fi | Assists in comprehending a low-cost technique for acquiring information about wi-fi distribution in a variety of locations |
2021 | [61] | Wardriving | Wi-fi security | Proposes a standalone python-based programme for assessing the vulnerability of wardriving-captured access points (APs) |
2021 | [62] | Penetration testing | Wi-fi security | Presents a kAli linux-based wi-fi penetration testing technique |
2021 | [63] | Wardriving | Wi-fi security | Analyses the results of evaluating the security of a wireless network on raspberry pi running kAli linux |
2021 | [36] | Survey | Wi-fi security | Examines the possibilities for integrity, availability, and confidentiality and also analyses most WLAN packet services and technologies, revealing safety |
2020 | [64] | War-flying | Cyber security | Designs a system for using a drone to capture and map unauthorized 2.4 GHz and 5 GHz wireless network access points in mission-critical infrastructure, then converting the data to a map view |
2019 | [65] | Survey | Network security | Highlights the prospective risk and forms of network security attacks, as well as shedding light on existing preventative approaches and making realistic ideas for their enhancement |
2019 | [66] | Wardriving | Wi-fi security | Provides a method for identifying rouge access points based on a set of static properties chosen from a well-conducted experiment on real-world locations |
2018 | [67] | Multi-parameter framework | WLAN security | Improves rouge access point detection in WLAN by using a multi-parameter-based approach |
2021 | [68] | War flying | WLAN security | Evaluate wireless networks drone system (warflying) that detects and analyses information such as access point locations, MAC, authentication, power, privacy, and encryption settings |
2020 | [69] | Survey | Wi-fi network security | Examines wireless technologies and the security vulnerabilities that these technologies offer to larger communication networks |
2017 | [70] | Survey | Wi-fi security | Focuses on developing solutions for mitigating cyber-attacks and examines the hazards associated with utilizing wireless devices to offer Internet service in open access zones |
2021 | [71] | Review | Wireless network security | Explores the worldwide implications of growing wireless network technologies and cyber security concerns and suggests some recommended remedies |
2021 | [72] | Wi-fi protocol model | Wi-fi security | Provides a model for detecting wi-fi protocol attacks with low false positives and varied low rates of false negatives for various attacks |
2021 | [61] | Analysis tool | Wireless access point security | A python language-based tool is proposed and implemented as a standalone tool for assessing an access Point’s vulnerability |
|