STAP Journal of Security Risk Management

ISSN: 3080-9444 (Online)

Cyber Security Risk Management for Threats in Wireless LAN: A Literature Review

by 

Michael Saad Alghareeb ;

Mohammed Almaayah

PDF logoPDF

Published: 2025/08/28

Abstract

Wireless LANs have been widely deployed in places such as business organizations, government agencies, hospitals, schools, and even the home environment. Mobility, flexibility, scalability, cost-effectiveness, and rapid deployment are some of the factors driving the spread of this technology. However, due to their nature wireless LANs are vulnerable to several types of attacks. Therefore, this study aims to discuss common threats related to the wireless LAN system, and a comprehensive review of existing studies regarding cybersecurity threats in Wireless LAN. A systematic literature review (SLR) was conducted to identify potential threats and identify appropriate countermeasures for each wireless WLA.

Keywords

Wireless LANsIEE 802.11AttacksSecurityAccess Point (AP)ThreatsAvailabilityAuthenticationIntegrityAccess controlWireless Countermeasure

References

  1. Abare, G., & Garba, E. J. (2019). A Proposed Model for Enhanced Security against Key Reinstallation Attack on Wireless Networks. International Journal of Scientific Research in Network Security and Communication, 7(3), 21–27.
  2. Ahadi, S. A. A., Baray, E., Rakesh, N., & Varshney, S. (2022). Public Wi-Fi security threat evil twin attack detection based on signal variant and hop count. AIP Conference Proceedings, 2424(1), 020002.
  3. Alotaibi, B., & Elleithy, K. (2016). A new mac address spoofing detection technique based on random forests. Sensors, 16(3), 281.
  4. Amin, A. A. M. M., & Mahamud, M. S. (2019). An alternative approach of mitigating arp based man-in-the-middle attack using client site bash script. 2019 6th International Conference on Electrical and Electronics Engineering (ICEEE), 112– 115.
  5. Aminanto, M. E., & Kim, K. (2016). Detecting impersonation attack in WiFi networks using deep learning approach. International Workshop on Information Security Applications, 136–147.
  6. Aung, M. A. C., & Thant, K. P. (2017). Detection and mitigation of wireless link layer attacks. 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), 173–178.
  7. Baray, E., & Ojha, N. K. (2021). WLAN security protocols and WPA3 security approach measurement through aircrack-ng technique. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 23–30.
  8. Bhushan, B., Sahoo, G., & Rai, A. K. (2017). Man-in-the-middle attack in wireless and computer networking—A review. 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), 1–6.
  9. Brar, T. S. (2018). Study and Detection of Jamming attacks in Wireless Networks.
  10. Dahiya, M., & Gill, S. (2017). Detection of rogue access point in wlan using hopfield neural network. International Journal of Electrical and Computer Engineering, 7(2), 1060.
  11. Dalal, N., Akhtar, N., Gupta, A., Karamchandani, N., Kasbekar, G. S., & Parekh, J. (2022). A Wireless Intrusion Detection System for 802.11 WPA3 Networks. 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 384–392.
  12. Kaur, J. (2016). Mac layer management frame denial of service attacks. 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), 155–160.
  13. Kavianpour, A., & Anderson, M. C. (2017). An overview of wireless network security. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 306–309.
  14. Khalid, H., Hashim, S. J., Ahmad, S., Hashim, F., & Chaudary, M. A. (2020). Cybersecurity in Industry 4.0 context: Background, issues, and future directions. The Nine Pillars of Technologies for Industry, 4, 263–307.
  15. Kim, W., Park, J., Jo, J., & Lim, H. (2019). Covert jamming using fake ACK frame injection on IEEE 802.11 wireless LANs. IEEE Wireless Communications Letters, 8(5), 1502–1505.
  16. Letsoalo, E., & Ojo, S. (2016). Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks. 2016 IST-Africa Week Conference, 1–10.
  17. Lounis, K., & Zulkernine, M. (2020). Exploiting race condition for Wi-Fi denial of service attacks. 13th International Conference on Security of Information and Networks, 1–8.
  18. Lu, H.-J., & Yu, Y. (2021). Research on wifi penetration testing with kali linux. Complexity, 2021.
  19. Ma, Y., & Ning, H. (2018). Improvement of EAP Authentication Method Based on Radius Server. 2018 IEEE 18th International Conference on Communication Technology (ICCT), 1324–1328.
  20. Nakhila, O. (2018). Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks.
  21. Ozkan-Okay, M., Aslan, Ö., Eryigit, R., & Samet, R. (2021). SABADT: Hybrid Intrusion Detection Approach for Cyber Attacks Identification in WLAN. IEEE Access, 9, 157639–157653.
  22. Pirayesh, H., & Zeng, H. (2021). Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. ArXiv Preprint ArXiv:2101.00292.
  23. Premkumar, M., & Sundararajan, T. V. P. (2020). DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems, 79, 103278.
  24. Qin, Y., Li, B., Yang, M., & Yan, Z. (2018). Attack detection for wireless enterprise network: a machine learning approach. 2018 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 1–6.
  25. Rahim, R. (2017). Man-in-the-middle-attack prevention using interlock protocol method. ARPN J. Eng. Appl. Sci, 12(22), 6483–6487.
  26. Santoro, D., Escudero-Andreu, G., Kyriakopoulos, K. G., Aparicio-Navarro, F. J., Parish, D. J., & Vadursi, M. (2017). A hybrid intrusion detection system for virtual jamming attacks on wireless networks. Measurement, 109, 79–87.
  27. Sathyavani, K. S., & Selvi, P. (2014). Wireless network security vulnerabilities, threats and countermeasures. International Conference on Information and Image Processing. Retrieved from Http://Www. Conference. Bonfring. Org/Papers/Sankara_iciip2014/Iciip89. Pdf.
  28. Sejdić, E., Djurović, I., & Stanković, Lj. (2011). Fractional Fourier transform as a signal processing tool: An overview of recent developments. Signal Processing, 91(6), 1351–1369.
  29. Seth, A. D., Biswas, S., & Dhar, A. K. (2019). De-Authentication Attack Detection using Discrete Event Systems in 802.11 Wi-Fi Networks. 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 1–6.
  30. Siahaan, A. P. U. (2016). WLAN Penetration Examination of The University of Pembangunan Panca Budi Singh, G. (2017). Wireless Network Components &Security Protocol.. International Journal of Advanced Research in Computer Science, 8(4).
  31. Singh, R. R., Moreira, J., Chothia, T., & Ryan, M. D. (2020). Modelling of 802.11 4-way handshake attacks and analysis of security properties. International Workshop on Security and Trust Management, 3–21.
  32. Sunday, N. A. (2008). Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures. Blekinge Institute of Technology School of Engineering Department of Telecommunications.
  33. Suroto, S. (2018a). WLAN security: threats and countermeasures. JOIV: International Journal on Informatics Visualization, 2(4), 232–238.
  34. Suroto, S. (2018b). WLAN security: threats and countermeasures. JOIV: International Journal on Informatics Visualization, 2(4), 232–238.
  35. Tao, Z., & Ruighaver, A. B. (2005). Wireless Intrusion Detection: Not as easy as traditional network intrusion detection. TENCON 2005-2005 IEEE Region 10 Conference, 1–5.
  36. Thing, V. L. L. (2017). IEEE 802.11 network anomaly detection and attack classification: A deep learning approach. 2017 IEEE Wireless Communications and Networking Conference (WCNC), 1–6.
  37. Tian, Y., Wang, S., & Zhang, L. (2021). Convolutional neural network based evil twin attack detection in WiFi networks. MATEC Web of Conferences, 336, 08006.
  38. Umesh, A. S. B. D. A. S. (2017). Rouge Access point: A Threat to Wireless Society.
  39. Vanhoef, M., Schepers, D., & Piessens, F. (2017). Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 360–371.