Closed WiFi Hotspot - Truly Hidden Network

被引:0
|
作者
Murugesan, Kumar [1 ]
Sriram, Srihari [1 ]
Kumar, Kavin [1 ]
Muralidhara, V. N. [2 ]
机构
[1] Samsung R Inst Bangalore, Bengaluru, India
[2] Int Inst Informat Technol Bangalore, Bengaluru, India
关键词
Eavesdropping; Closed WiFi Hotspot; Hidden Network; Management Frame Encryption; PTK Protection;
D O I
10.1109/ICCE56470.2023.10043474
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
IEEE 802.11 (WiFi) has evolved in recent years to an extent where it has become an integral part of our life. Despite its popularity, security is one of the major concerns associated with WiFi networks. New vulnerabilities have been found in WiFi systems every year and are patched periodically. There are several hacking tools available to the public for attacking wireless networks. The first logical steps used by these tools include discovering the networks and their associated vulnerabilities. The WiFi networks are not designed to be hidden from eavesdroppers; much useful information about the network is still broadcasted in management frames. The Hidden Network feature, which is present in most Access Points and Mobile Hotspot solutions, does not provide a true hidden feature, and advanced tools exploit it. IEEE 802.11w standard provides integrity to the management frames after secure associations. However, it does not provide confidentiality to all the management frames. This paper proposes a method for creating a closed WiFi Hotspot that can act as a truly hidden network by encrypting Information Elements in Management Frames. We have also shown that the proposed Management Frame Encryption key can be used to secure Pairwise Transient Key (PTK) generation in WiFi networks. Our experimental results clearly show that advanced hacking tools cannot initiate attacks on the proposed Closed WiFi Hotspots. Our experimental results also reveal that there is not much overhead to the connection sequence when implementing the proposed Closed WiFi solution.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [21] FC-WiFi: An OpenFlow based WiFi Network with Free Configuration
    Wu, Junqing
    Chen, Ming
    Hu, Chao
    Zhang, Guomin
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 52 - 58
  • [22] Network traffic analysis and prediction of Hotspot in cellular network
    Cao, Aoxiang
    Qiao, Yuanyuan
    Sun, Kewu
    Zhang, Hao
    Yang, Jie
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 452 - 456
  • [23] Hotspot clustering for ad hoc network
    Jing, X
    Zhang, J
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 705 - 709
  • [24] Analysis of the IoT WiFi Mesh Network
    Lech, Piotr
    Wlodarski, Przemyslaw
    CYBERNETICS AND MATHEMATICS APPLICATIONS IN INTELLIGENT SYSTEMS, CSOC2017, VOL 2, 2017, 574 : 272 - 280
  • [25] Usage Patterns in an Urban WiFi Network
    Afanasyev, Mikhail
    Chen, Tsuwei
    Voelker, Geoffrey M.
    Snoeren, Alex C.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (05) : 1359 - 1372
  • [26] Network Optimization for Integration of WiFi and WiMAX
    Sultan, Juwita Mohd
    Markarian, Garik
    2015 FOURTH INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION TECHNOLOGY (FGCT), 2015,
  • [27] Hidden-node. removal and its application in cellular WiFi networks
    Jiang, Li Bin
    Liew, Soung Chang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (05) : 2641 - 2654
  • [28] Chiari' s network: A truly a benign entity?
    Brunet-Garcia, Laia
    Font, Mar Albujar
    Sanchez-de-Toledo, Joan
    Bellon, Juan Manuel Carretero
    ANALES DE PEDIATRIA, 2023, 98 (03): : 239 - 240
  • [29] Comcast Optical Network: A Truly Converged Infrastructure
    Akhtar, Shamim
    2011 OPTICAL FIBER COMMUNICATION CONFERENCE AND EXPOSITION (OFC/NFOEC) AND THE NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, 2011,
  • [30] MODEL OF TRULY CLOSED CIRCUIT OF WASTE STREAM FLOW IN METALLURGICAL ENTERPRISE
    Gajdzik, B.
    Michlowicz, E.
    Zwolinska, B.
    Kisiel, P.
    METALURGIJA, 2014, 53 (02): : 257 - 260