U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Eavesdropping

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Type of attack in which an adversary uses a WiMAX traffic analyzer within the range of a BS or SS/MS to monitor WiMAX communications.
Source(s):
NIST SP 800-127 [Withdrawn]

  An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant.
Source(s):
NIST SP 800-63-3 under Eavesdropping Attack

  An attack in which an Attacker listens passively to the authentication protocol to capture information which can be used in a subsequent active attack to masquerade as the Claimant.
Source(s):
NIST SP 800-63-2 under Eavesdropping Attack [Superseded]