Detecting and Localizing Transmitters in a Wireless Evil-Twin Attack ∗
نویسندگان
چکیده
In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn’t lie about its identity. The evil-twin uses the identity of the truth teller and transmits at the same time as the truth-teller. The receivers are bound to get confused about the location of the honest transmitter. We describe an algorithm to detect such a wireless evil-twin attack, and locate the truth-teller and the evil-twin transmitter. Four-square antennas are used by the receivers to detect an attack. RSS values measured at the receivers are used by Hyperbolic Position Bounding (HPB) to locate the transmitters in the wireless network with a degree of confidence. The performance of the algorithm is tested using a simulation of a wireless network.
منابع مشابه
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...
متن کاملCross Verification-based Detection of the Evil Ring Attack in Wireless Sensor Networks
In ad hoc networks and wireless sensor networks, several routing algorithms rely on the knowledge by the network nodes of their own geographic location and those of others. For cases where a node doesn’t have its own positioning device (e.g., GPS), Alfaro et al. propose several algorithms that a node can run to determine its geographic position using position reports from neighbors. In this pap...
متن کاملDetection and Prevention against Evil Twin Attack in Wlan
Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively fulfills the necessities within buildings and campus environments. Emerging security measures for the WLAN is a foremost issue when compared to the security features of LAN. Wireless access points mainly fall into three categories: minor business and home networks, enter...
متن کاملWho is peeping at your passwords at Starbucks? - To catch an evil twin access point
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users’ Internet access. Existing evil twin detection solutions are mostly for wireles...
متن کاملMETDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points
Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil...
متن کامل