Reference : Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17479
Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11
English
Lanze, Fabian mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Panchenko, Andriy mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Ponce-Alcaide, Ignacio mailto [University of Malaga > Escuela Técnica Superior de Ingeniería Informática]
Engel, Thomas mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Sep-2014
Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
Yes
The 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet'14)
21.09.2014
[en] Evil Twin Attack ; Survey ; Fake AP ; Software AP ; Detection
[en] Commonly used identifiers for IEEE 802.11 access points
(APs), such as network name (SSID), MAC (BSSID), or
IP address can be trivially spoofed. Impersonating existing
APs with faked ones to attract their traffic is referred to in
the literature as the evil twin attack. It allows an attacker
with little effort and expenditure to fake a genuine AP and
intercept, collect, or alter (potentially even encrypted) data.
Due to its severity, the topic has gained remarkable research
interest in the past decade. In this paper, we introduce a
differentiated attacker model to express the attack in all its
facets. We propose a taxonomy for classifying and struc-
turing countermeasures and apply it to existing approaches.
We are the first to conduct a comprehensive survey in this
domain to reveal the potential and the limits of state-of-
the-art solutions. Our study discloses an important attack
scenario which has not been addressed so far, i.e., the usage
of specialized software to mount the attack. We propose and
experimentally validate a novel method to detect evil twin
APs operated by software within a few seconds.
http://hdl.handle.net/10993/17479
FP7 ; 288535 - CONFINE - Community Networks Testbed for the Future Internet

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
Q2SWinet_CAMERA_READY.pdfAuthor preprint545.23 kBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.