International Journal of Innovative Science Engineering and Technology (IJISET)
The recent developments in the wireless technology and their large utilization have made incredible improvements in throughput in the corporate and industrial sectors. However, these recent developments have also introduced new security vulnerabilities. Since the wireless shared medium is totally exposed to outsiders, it is vulnerable to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, interruption of the Medium Access Control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks on the transport protocol, or even attacks intended to interrupt specific applications.