Closed WiFi Hotspot - Truly Hidden Network

被引:0
|
作者
Murugesan, Kumar [1 ]
Sriram, Srihari [1 ]
Kumar, Kavin [1 ]
Muralidhara, V. N. [2 ]
机构
[1] Samsung R Inst Bangalore, Bengaluru, India
[2] Int Inst Informat Technol Bangalore, Bengaluru, India
关键词
Eavesdropping; Closed WiFi Hotspot; Hidden Network; Management Frame Encryption; PTK Protection;
D O I
10.1109/ICCE56470.2023.10043474
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IEEE 802.11 (WiFi) has evolved in recent years to an extent where it has become an integral part of our life. Despite its popularity, security is one of the major concerns associated with WiFi networks. New vulnerabilities have been found in WiFi systems every year and are patched periodically. There are several hacking tools available to the public for attacking wireless networks. The first logical steps used by these tools include discovering the networks and their associated vulnerabilities. The WiFi networks are not designed to be hidden from eavesdroppers; much useful information about the network is still broadcasted in management frames. The Hidden Network feature, which is present in most Access Points and Mobile Hotspot solutions, does not provide a true hidden feature, and advanced tools exploit it. IEEE 802.11w standard provides integrity to the management frames after secure associations. However, it does not provide confidentiality to all the management frames. This paper proposes a method for creating a closed WiFi Hotspot that can act as a truly hidden network by encrypting Information Elements in Management Frames. We have also shown that the proposed Management Frame Encryption key can be used to secure Pairwise Transient Key (PTK) generation in WiFi networks. Our experimental results clearly show that advanced hacking tools cannot initiate attacks on the proposed Closed WiFi Hotspots. Our experimental results also reveal that there is not much overhead to the connection sequence when implementing the proposed Closed WiFi solution.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Network coding for unicast in a WiFi hotspot: Promises, challenges, and testbed implementation
    Chieochan, S.
    Hossain, E.
    [J]. COMPUTER NETWORKS, 2012, 56 (12) : 2963 - 2980
  • [2] Open source Wifi hotspot implementation
    Sondag, Tyler
    Feher, Jim
    [J]. INFORMATION TECHNOLOGY AND LIBRARIES, 2007, 26 (02) : 35 - 43
  • [3] A Simple WiFi Hotspot Model for Cities
    Seufert, Michael
    Griepentrog, Tobias
    Burger, Valentin
    Hossfeld, Tobias
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (02) : 384 - 387
  • [4] WiFi Hotspot Market Stages Revival in 2009
    不详
    [J]. MICROWAVE JOURNAL, 2010, 53 (01) : 53 - 53
  • [5] Smart WiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot
    Ivanov, Nikolay
    Lou, Jianzhi
    Yan, Qiben
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 425 - 445
  • [6] Applicability and Limitations of a Simple WiFi Hotspot Model for Cities
    Seufert, Michael
    Moldovan, Christian
    Burger, Valentin
    Hossfeld, Tobias
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [7] Throughput Analysis of Vehicular Internet Access via Roadside WiFi Hotspot
    Xu, Wenchao
    Shi, Weisen
    Lyu, Feng
    Zhou, Haibo
    Cheng, Nan
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 3980 - 3991
  • [8] The Study of RTK Receiver Based on WIFI Hotspot in Wireless Communication Datalink
    Yang Guo-dong
    Li Zhao-tong
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 371 - 375
  • [9] Hidden hotspot track beneath the eastern United States
    Risheng Chu
    Wei Leng
    Don V. Helmberger
    Michael Gurnis
    [J]. Nature Geoscience, 2013, 6 : 963 - 966
  • [10] Barcoding herpetological collections: discovering hidden biodiversity in a hotspot
    Daza, Juan M.
    Restrepo, Adriana
    [J]. GENOME, 2015, 58 (05) : 209 - 210