Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks

被引:0
|
作者
Zhao, Peng [1 ]
Bian, Kaigui [1 ]
Chen, Ping [2 ]
Zhao, Tong [1 ]
Duan, Yichun [1 ]
Yan, Wei [1 ]
机构
[1] Peking Univ, Sch EECS, Beijing, Peoples R China
[2] Peking Univ, Comp Ctr, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually deploys sensors (sniffers and/or USB-based wireless adapters) and conducts radio frequency (RF) sensing at a large scale to detect the anomaly at link and physical layers; and (2) the measurement-based approach enables a laptop to determine the legitimacy of a given AP by monitoring the RTT (round trip time) of data and/or control messages. However, these approaches require the additional cost on either the hardware deployment, or periodic statistical measurements. In this paper, we present Trident, a context-based reverse authentication method for detecting phishing AP in commodity WiFi networks, which requires no extra hardware deployment or periodic statistical measurements. Specifically, Trident employs a challenge-response protocol that allows a user to (reversely) authenticate an AP by two steps: (1) sending the AP a few questions regarding three user-context features (time, location, traffic) during the user-AP interaction procedure, and (2) examining the answers returned by the AP to determine its legitimacy. Our experimental results reveal that Trident achieves a high reliability rate(1) of 95% and a detection rate of 98% when users are connecting rogue APs in the commodity WiFi network on campus.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Context-Based Adaptive and Responsive Authentication
    Lenzini, Gabriele
    Hulsebosch, Bob
    [J]. ERCIM NEWS, 2007, (71): : 34 - 35
  • [2] Revisiting Context-Based Authentication in loT
    Miettinen, Markus
    Thien Duc Nguyen
    Sadeghi, Ahmad-Reza
    Asokan, N.
    [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [3] Multimodal Context-Based Continuous Authentication
    Aathreya, Saandeep
    Chaudhary, Meghna
    Neal, Tempestt
    Canavan, Shaun
    [J]. 2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,
  • [4] Context-based authentication and transport of cultural assets
    Leonardo Mostarda
    Changyu Dong
    Naranker Dulay
    [J]. Personal and Ubiquitous Computing, 2010, 14 : 321 - 334
  • [5] Context-based authentication and transport of cultural assets
    Mostarda, Leonardo
    Dong, Changyu
    Dulay, Naranker
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2010, 14 (04) : 321 - 334
  • [6] Model for adaptable context-based biometric authentication for mobile devices
    Adam Wójtowicz
    Krzysztof Joachimiak
    [J]. Personal and Ubiquitous Computing, 2016, 20 : 195 - 207
  • [7] Model for adaptable context-based biometric authentication for mobile devices
    Wojtowicz, Adam
    Joachimiak, Krzysztof
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (02) : 195 - 207
  • [8] Research on Phishing AP Attack Detection Technology Based on RSSI
    Ling Jie
    Jin Shuangqi
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 205 - 208
  • [9] WiFi Authentication through Social Networks - a Decentralized and Context-Aware Approach -
    Durmus, Yunus
    Langendoen, Koen
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 532 - 538
  • [10] Context-based object detection in still images
    Bergboer, N. H.
    Postma, E. O.
    van den Herik, H. J.
    [J]. IMAGE AND VISION COMPUTING, 2006, 24 (09) : 987 - 1000