Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks

被引:0
|
作者
Zhao, Peng [1 ]
Bian, Kaigui [1 ]
Chen, Ping [2 ]
Zhao, Tong [1 ]
Duan, Yichun [1 ]
Yan, Wei [1 ]
机构
[1] Peking Univ, Sch EECS, Beijing, Peoples R China
[2] Peking Univ, Comp Ctr, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually deploys sensors (sniffers and/or USB-based wireless adapters) and conducts radio frequency (RF) sensing at a large scale to detect the anomaly at link and physical layers; and (2) the measurement-based approach enables a laptop to determine the legitimacy of a given AP by monitoring the RTT (round trip time) of data and/or control messages. However, these approaches require the additional cost on either the hardware deployment, or periodic statistical measurements. In this paper, we present Trident, a context-based reverse authentication method for detecting phishing AP in commodity WiFi networks, which requires no extra hardware deployment or periodic statistical measurements. Specifically, Trident employs a challenge-response protocol that allows a user to (reversely) authenticate an AP by two steps: (1) sending the AP a few questions regarding three user-context features (time, location, traffic) during the user-AP interaction procedure, and (2) examining the answers returned by the AP to determine its legitimacy. Our experimental results reveal that Trident achieves a high reliability rate(1) of 95% and a detection rate of 98% when users are connecting rogue APs in the commodity WiFi network on campus.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Context-based recognition of process states using neural networks
    Srinivasan, R
    Wang, C
    Ho, WK
    Lim, KW
    [J]. CHEMICAL ENGINEERING SCIENCE, 2005, 60 (04) : 935 - 949
  • [42] Context-based wireless mesh networks: a case for network virtualization
    Matos, Ricardo
    Sargento, Susana
    Hummel, Karin Anna
    Hess, Andrea
    Tutschku, Kurt
    de Meer, Hermann
    [J]. TELECOMMUNICATION SYSTEMS, 2012, 51 (04) : 259 - 272
  • [43] Context-based influence maximization with privacy protection in social networks
    Jing, Dong
    Liu, Ting
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [44] User context-based data delivery in opportunistic smartphone networks
    Talipov, Elmurod
    Chon, Yohan
    Cha, Hojung
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 17 : 122 - 138
  • [45] FingerPass: Finger Gesture-based Continuous User Authentication for Smart Homes Using Commodity WiFi
    Kong, Hao
    Lu, Li
    Yu, Jiadi
    Chen, Yingying
    Kong, Linghe
    Li, Minglu
    [J]. PROCEEDINGS OF THE 2019 THE TWENTIETH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '19), 2019, : 201 - 210
  • [46] Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering
    Wu, Xingyu
    Qiao, Ziyan
    Cai, Xingjuan
    Wang, Qian
    Xie, Zhiqiang
    Sun, Rui
    Zi, Dong
    Niu, Wenjia
    Tong, Endong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [47] Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
    Al-Rumaim, Akram
    Pawar, Jyoti D.
    [J]. IEEE ACCESS, 2024, 12 : 110850 - 110861
  • [48] Context-based robust face detection algorithm for surveillance cameras
    Miwa, Shotaro
    Kage, Hiroshi
    Sumi, Kazuhiko
    [J]. IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2012, 7 (06) : 607 - 612
  • [49] Context-based modeling for accurate logo detection in complex environments
    Jia, Zhixiang
    Hou, Sujuan
    Li, Peng
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 98
  • [50] CGRM: A Context-Based Graph Reasoning Model for Fitting Detection
    Zhai, Yongjie
    Wang, Qianming
    Guo, Congbin
    Chen, Nianhao
    Yang, Xu
    Zhao, Zhenbing
    Zhao, Wenqing
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71