 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
eavesdropping
|
|
|
|
– |
and
recording radio traffic
|
|
|
|
– |
and
recording IP traffic / traffic on the MAC level (e.g. tcpdump)
|
|
|
• |
denial
of service
|
|
|
|
– |
IP
DoS attacks
|
|
|
|
– |
Radio
DoS attacks
|
|
|
|
– |
Interference
from other devices on unlicensed 2.4GHz band (e.g
|
|
|
Bluetooth,
microwave ovens, other links)
|
|
|
• |
integrity
/ replay
|
|
|
|
– |
MAC
address forging, IP hijacking
|
|
|
|
– |
replay
registration attacks against WLAN access point
|
|
|
|
– |
IP
replay / integrity / man-in-the-middle attacks (e.g. forging email,
|
|
capturing
keys)
|
|