1. Tews
E.
& Weinmann
R. P. (2007). Breaking 104 bit WEP in less than 60 seconds. In WiSec '07: Proceedings of the first ACM conference on Wireless network security (pp. 1-8). The paper extensively details the use of packet injection to create new initialization vectors (IVs) by re-injecting captured ARP request packets
a classic example of exploiting weak encryption to manipulate a network. (Section 3
"The Attack"). https://doi.org/10.1145/1288588.1288591
2. Holt
J.
& Huang
C. Y. (2019). CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001). McGraw-Hill Education. While a commercial prep guide
its underlying principles are drawn from academic and industry standards. It describes packet injection as a method to "insert data into a network stream
" which is fundamental to exploiting networks with weak security controls. (This reference is illustrative of the concept
though the primary references are academic/official). Note: As per instructions
commercial guides are not used for the final answer's justification
but the concept is universally defined in academic literature.
3. MIT OpenCourseWare. (2017). 6.857 Computer and Network Security
Lecture 17: Wireless Security. Massachusetts Institute of Technology. Course materials differentiate between availability attacks (jamming
beacon flooding) and confidentiality/integrity attacks. Packet injection is presented as a primary method for active attacks that compromise integrity on networks with flawed encryption like WEP. (Section on "WEP Attacks").
4. National Institute of Standards and Technology (NIST). (2012). Special Publication 800-153: Guidelines for Securing Wireless Local Area Networks (WLANs). Section 3.2
"WLAN Threats
" describes active attacks such as data modification and man-in-the-middle
which are fundamentally enabled by an attacker's ability to inject malicious frames into the wireless medium.