Practical Defenses for Evil Twin Attacks in 802.11

被引:0
|
作者
Gonzales, Harold [1 ]
Bauer, Kevin [1 ]
Lindqvist, Janne [2 ]
McCoy, Damon [3 ]
Sicker, Douglas [1 ]
机构
[1] Univ Colorado, Boulder, CO 80309 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Univ Calif San Diego, San Diego, CA 92103 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where an adversary clones a client's previously-used access point for a variety of malicious purposes including malware injection or identity theft. We propose defenses that aim to maintain the simplicity, convenience, and usability of open-access networks while offering increased protection from evil twin attacks. First, we present an evil twin detection strategy called context-leashing that constrains access point trust by location. Second, we propose that wireless networks be identified by uncertified public keys and design an SSH-style authentication and session key establishment protocol that fits into the 802.1X standard. Lastly, to mitigate the pitfalls of SSH-style authentication, we present a crowd-sourcing-based reporting protocol that provides historical information for access point public keys while preserving the location privacy of users who contribute reports.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Mitigating Evil Twin Attacks in 802.11
    Bauer, Kevin
    Gonzales, Harold
    McCoy, Damon
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 513 - 516
  • [2] Measures to Abate Evil Twin Attacks in 802.11
    Mandal, Sayonnha
    Veldanda, Nagadivya
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 178 - 184
  • [3] Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
    Lu, Qian
    Qu, Haipeng
    Zhuang, Yuan
    Lin, Xi-Jun
    Ouyang, Yuzhan
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (10): : 2465 - 2473
  • [4] Evil Twin Attack Mitigation Techniques in 802.11 Networks
    Muthalagu, Raja
    Sanjay, Sachin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 38 - 41
  • [5] Evil Twin Attack Mitigation Techniques in 802.11 Networks
    Muthalagu R.
    Sanjay S.
    [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (06): : 38 - 41
  • [6] Privacy Attacks and Defenses for Digital Twin Migrations in Vehicular Metaverses
    Luo, Xiaofeng
    Wen, Jinbo
    Kang, Jiawen
    Nie, Jiangtian
    Xiong, Zehui
    Zhang, Yang
    Yang, Zhaohui
    Xie, Shengli
    [J]. IEEE NETWORK, 2023, 37 (06): : 82 - 91
  • [7] Jamming attacks and defenses for fast association in IEEE 802.11ah networks
    Yin, Wei
    Hu, Peizhao
    Zhou, Hongjian
    Xing, Guoqiang
    Wen, Jiahui
    [J]. COMPUTER NETWORKS, 2022, 208
  • [8] Practical Defenses Against Pollution Attacks in Wireless Network Coding
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [9] A Passive Client-based Approach to Detect Evil Twin Attacks
    Lu, Qian
    Qu, Haipeng
    Zhuang, Yuan
    Lin, Xi-Jun
    Zhu, Yanyong
    Liu, Yunzheng
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 233 - 239
  • [10] CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots
    Mustafa, Hossen
    Xu, Wenyuan
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 238 - 246