Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
نویسندگان
چکیده
منابع مشابه
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...
متن کاملDetecting Evil-twin Attacks in Smart Homes Using The Received Signal Strength Indicator
Evil-twin is a common attack in WIFI environments, with which an attacker can set up a fake AP to steal sensitive information from the connected devices. The current approaches of detecting Evil-twin AP use some identities or fingerprints (such as SSIDs, MAC address and network traffic patterns) to verify the identify of the AP. However, such information can be easily obtained and faked by the ...
متن کاملUsing received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks
With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-midd...
متن کاملAchieving robust wireless localization resilient to signal strength attacks
Received signal strength (RSS) based algorithms have been very attractive for localization since they allow the reuse of existing communication infrastructure and are applicable to many commodity radio technologies. Such algorithms, however, are sensitive to a set of noncryptographic attacks, where the physical measurement process itself can be corrupted by adversaries. For example, the attacke...
متن کاملrssat: a wireless intrusion detection system based on received signal strength acceptance test
intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Information Systems
سال: 2017
ISSN: 1574-017X,1875-905X
DOI: 10.1155/2017/1248578