Detection and Prevention against Evil Twin Attack in Wlan

نویسندگان

  • Anil Kumar
  • Bibhav Raj
  • Partha Paul
چکیده

Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively fulfills the necessities within buildings and campus environments. Emerging security measures for the WLAN is a foremost issue when compared to the security features of LAN. Wireless access points mainly fall into three categories: minor business and home networks, enterprise networks, and hotspots. Wi-Fi Protected Access (WPA) offers solutions for home, small business, and enterprise networks, but hotspots usually are not safe at the Medium Access Control (MAC) layer because they are open to the public. Inexperienced users may become sufferers of “Evil Twin” access point’s attacks. These unauthorized access points are operated by offenders in an attempt to launch man-in-themiddle attacks. In our approach, we present a simple mechanism for protection and detection against an evil twin attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points

Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil...

متن کامل

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...

متن کامل

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point

In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users’ Internet access. Existing evil twin detection solutions are mostly for wireles...

متن کامل

Detecting and Localizing Transmitters in a Wireless Evil-Twin Attack ∗

In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn’t lie about its identity. The e...

متن کامل

POSTER: Android + Open Wi-Fis = Broken SSL?

In previous work [1] we demonstrated severe problems with the way Android applications use SSL. We performed an in-depth study of 13,500 Android apps and discovered that a large number of apps did not use SSL correctly and thus, were vulnerable to Man-In-The-Middle attacks. To make these threats a reality, an attacker needs to execute an active man-in-the-middle attack (MITMA). While MITMAs are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016