User-Side Wi-Fi Evil Twin Attack Detection Using Random Wireless Channel Monitoring

Keywords

Evil twin attack; Open WiFi-Hop; WLANs Security

Abstract

Free open wireless Internet access is a complimentary Wi-Fi service offered by most coffee shops, fast food restaurants and airports to their customers. For ease of access, these Wi-Fi networks are inherently insecure where no authentication/encryption is used to protect customers wireless data. An attacker can easily deceive a wireless customer (WC) by setting up a rogue access point (RAP) impersonating the legitimate access point (LAP). The WC connecting to the RAP becomes an easy target to the Man-In-the-Middle Attack (MIMA) and data traffic snooping. In this paper, we present a real-time client-side detection scheme to detect evil twin attack (ETA) when the attacker relies on the LAP to direct WC data to the Internet. The WC can detect ETA by monitoring multiple Wi-Fi channels in a random order looking for specific data packets sent by a dedicated sever on the Internet. Once an ETA is detected, our scheme can clearly identify whether a specific AP is a LAP or a RAP. The effectiveness of the proposed detection method was mathematically modeled, prototyped and evaluated in real life environment with a detection rate approximates to 100%.

Publication Date

12-22-2016

Publication Title

Proceedings - IEEE Military Communications Conference MILCOM

Number of Pages

1243-1248

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/MILCOM.2016.7795501

Socpus ID

85011865919 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/85011865919

This document is currently not available here.

Share

COinS