**7. Security attacks in wireless networks**

Most attacks in wireless networks are classified into two categories: passive and active. Passive attacks such as eavesdropping and traffic analysis do not interfere with normal network operations as opposed to active attacks. Some of the attacks could be circumvented by the cross-layer security scheme presented in this research due to the following characteristics inherent in its implementation:

**A. Appendix: transition tables**

*DOI: http://dx.doi.org/10.5772/intechopen.82390*

*A New Cross-Layer FPGA-Based Security Scheme for Wireless Networks*

**Author details**

**31**

Michael Ekonde Sone

College of Technology, University of Buea, Buea, Cameroon

© 2018 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium,

\*Address all correspondence to: michael.sone@ubuea.cm

provided the original work is properly cited.


Other attacks such as denial of service and replay attack could be circumvented if the cross-layer security scheme is associated with Transmission Control Protocol (TCP).
