Practical Defenses for Evil Twin Attacks in 802.11

被引:0
|
作者
Gonzales, Harold [1 ]
Bauer, Kevin [1 ]
Lindqvist, Janne [2 ]
McCoy, Damon [3 ]
Sicker, Douglas [1 ]
机构
[1] Univ Colorado, Boulder, CO 80309 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Univ Calif San Diego, San Diego, CA 92103 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where an adversary clones a client's previously-used access point for a variety of malicious purposes including malware injection or identity theft. We propose defenses that aim to maintain the simplicity, convenience, and usability of open-access networks while offering increased protection from evil twin attacks. First, we present an evil twin detection strategy called context-leashing that constrains access point trust by location. Second, we propose that wireless networks be identified by uncertified public keys and design an SSH-style authentication and session key establishment protocol that fits into the 802.1X standard. Lastly, to mitigate the pitfalls of SSH-style authentication, we present a crowd-sourcing-based reporting protocol that provides historical information for access point public keys while preserving the location privacy of users who contribute reports.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [21] Classifying RFID attacks and defenses
    Aikaterini Mitrokotsa
    Melanie R. Rieback
    Andrew S. Tanenbaum
    Information Systems Frontiers, 2010, 12 : 491 - 505
  • [22] Attacks on Deidentification's Defenses
    Cohen, Aloni
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 1469 - 1486
  • [23] Password Managers: Attacks and Defenses
    Silver, David
    Jana, Suman
    Boneh, Dan
    Chen, Eric
    Jackson, Collin
    PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 449 - 464
  • [24] Randomized cryptosystems attacks and defenses
    Hussein, Gamal
    2006 International Conference on Computer Engineering & Systems, 2006, : 232 - 236
  • [25] Classifying RFID attacks and defenses
    Mitrokotsa, Aikaterini
    Rieback, Melanie R.
    Tanenbaum, Andrew S.
    INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
  • [26] Online privacy: Attacks and defenses
    Herrmann, Dominik
    IT-INFORMATION TECHNOLOGY, 2015, 57 (02): : 133 - 137
  • [27] The Survey of RFID Attacks and Defenses
    Li, Hong
    Chen, YongHui
    He, ZhangQing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [28] Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses
    Tong, Wei
    Tong, Yinggang
    Xia, Chang
    Hua, Jingyu
    Li, Qun
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2433 - 2449
  • [29] Evil Twin Attack Detection using Discrete Event Systems in IEEE 802.11 Wi-Fi Networks
    Selvarathinam, Nirmal S.
    Dhar, Amit Kumar
    Biswas, Santosh
    2019 27TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2019, : 316 - 321
  • [30] An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2018, 25 (02) : 130 - 145