Practical Defenses for Evil Twin Attacks in 802.11

被引:0
|
作者
Gonzales, Harold [1 ]
Bauer, Kevin [1 ]
Lindqvist, Janne [2 ]
McCoy, Damon [3 ]
Sicker, Douglas [1 ]
机构
[1] Univ Colorado, Boulder, CO 80309 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Univ Calif San Diego, San Diego, CA 92103 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where an adversary clones a client's previously-used access point for a variety of malicious purposes including malware injection or identity theft. We propose defenses that aim to maintain the simplicity, convenience, and usability of open-access networks while offering increased protection from evil twin attacks. First, we present an evil twin detection strategy called context-leashing that constrains access point trust by location. Second, we propose that wireless networks be identified by uncertified public keys and design an SSH-style authentication and session key establishment protocol that fits into the 802.1X standard. Lastly, to mitigate the pitfalls of SSH-style authentication, we present a crowd-sourcing-based reporting protocol that provides historical information for access point public keys while preserving the location privacy of users who contribute reports.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [31] Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
    Tang, Zhanyong
    Zhao, Yujie
    Yang, Lei
    Qi, Shengde
    Fang, Dingyi
    Chen, Xiaojiang
    Gong, Xiaoqing
    Wang, Zheng
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [32] LANG 'MY EVIL TWIN'
    CROSS, A
    MUSICAL TIMES, 1993, 134 (1800): : 103 - 103
  • [33] Gaia's evil twin
    Ward, Peter
    NEW SCIENTIST, 2009, 202 (2713) : 28 - 31
  • [34] Security Analysis and Implementation of a Simple Method for Prevention and Detection against Evil Twin Attack in IEEE 802.11 Wireless LAN
    Kumar, Anil
    Paul, Partha
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [35] Attacks and their Defenses for Advanced Metering Infrastructure
    Lighari, Sheeraz Niaz
    Hussain, Dil Muhammad Akbar
    Jensen, Birgitte Bak
    Shaikh, Asad Ali
    2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 148 - 151
  • [36] Sybil Attacks and Their Defenses in the Internet of Things
    Zhang, Kuan
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 372 - 383
  • [37] DeepRobust: a Platform for Adversarial Attacks and Defenses
    Li, Yaxin
    Jin, Wei
    Xu, Han
    Tang, Jiliang
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 16078 - 16080
  • [38] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    ENGINEERING, 2020, 6 (03) : 346 - 360
  • [39] Robust wireless localization: Attacks and defenses
    Zhang, Yanyong
    Trappe, Wade
    Li, Zang
    Joglekar, Manali
    Nath, Badri
    SECURE LOCALIZATION AND TIME SYNCHRONIZATION FOR WIRELESS SENSOR AND AD HOC NETWORKS, 2007, 30 : 137 - +
  • [40] Rebroadcast Attacks: Defenses, Reattacks, and Redefenses
    Fan, Wei
    Agarwal, Shruti
    Farid, Hany
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 942 - 946