Skip to main content
Top

2018 | OriginalPaper | Chapter

Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer

Authors : Chundong Wang, Likun Zhu, Liangyi Gong, Zheli Liu, Xiuliang Mo, Wenjun Yang, Min Li, Zhaoyang Li

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the popularity of mobile computing, WiFi has become one of the essential technologies for people to access the Internet, and WiFi security has also become a major threat for mobile computing. The Evil-Twin attack can steal a large amount of private data by forging the same SSID as the real Access Point. This paper proposes a passive Evil-Twin attack detection scheme through CSI in physical layer. First of all, we propose a location model based on the edge of landmark area. In this model, the improved MUSIC algorithm is used to calculate each AP’s AoA by CSI phase. Secondly, it proposes an algorithm for simplifying the generation of location model files, which is the dataset of a small number of AoA and RSSI samples. Finally, according to location model, attack detection algorithm combines a large number of crowd sensing data to determine whether it is a malicious AP. Experiments show that our attack detection system achieves a higher detection rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Alotaibi, B., Elleithy, K.: An empirical fingerprint framework to detect rogue access points. In: Systems, Applications and Technology Conference, pp. 1–7 (2015) Alotaibi, B., Elleithy, K.: An empirical fingerprint framework to detect rogue access points. In: Systems, Applications and Technology Conference, pp. 1–7 (2015)
2.
go back to reference Bahl, P., et al.: Enhancing the security of corporate Wi-Fi networks using DAIR. In: International Conference on Mobile Systems, Applications, and Services, pp. 1–14 (2006) Bahl, P., et al.: Enhancing the security of corporate Wi-Fi networks using DAIR. In: International Conference on Mobile Systems, Applications, and Services, pp. 1–14 (2006)
3.
go back to reference Beyah, R., Kangude, S., Yu, G., Strickland, B.: Rogue access point detection using temporal traffic characteristics. In: Global Telecommunications Conference, GLOBECOM 2004, vol. 4, pp. 2271–2275. IEEE (2004) Beyah, R., Kangude, S., Yu, G., Strickland, B.: Rogue access point detection using temporal traffic characteristics. In: Global Telecommunications Conference, GLOBECOM 2004, vol. 4, pp. 2271–2275. IEEE (2004)
4.
go back to reference Burns, A., Wu, L., Du, X., Zhu, L.: A novel traceroute-based detection scheme for Wi-Fi evil twin attacks. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017 (2018) Burns, A., Wu, L., Du, X., Zhu, L.: A novel traceroute-based detection scheme for Wi-Fi evil twin attacks. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017 (2018)
5.
go back to reference Desmond, L.C.C., Yuan, C.C., Tan, C.P., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, 31 March–April, pp. 46–55 (2008) Desmond, L.C.C., Yuan, C.C., Tan, C.P., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, 31 March–April, pp. 46–55 (2008)
6.
go back to reference Elleithy, K., Alotaibi, B.: A passive fingerprint technique to detect fake access points. In: IEEE Wireless Telecommunications Symposium (2015) Elleithy, K., Alotaibi, B.: A passive fingerprint technique to detect fake access points. In: IEEE Wireless Telecommunications Symposium (2015)
7.
go back to reference Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue ap detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)CrossRef Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue ap detection. IEEE Trans. Parallel Distrib. Syst. 22(11), 1912–1925 (2011)CrossRef
8.
go back to reference Hsu, F.H., Wang, C.S., Hsu, Y.L., Cheng, Y.P., Hsneh, Y.H.: A client-side detection mechanism for evil twins. Comput. Electr. Eng. 59, 76–85 (2015)CrossRef Hsu, F.H., Wang, C.S., Hsu, Y.L., Cheng, Y.P., Hsneh, Y.H.: A client-side detection mechanism for evil twins. Comput. Electr. Eng. 59, 76–85 (2015)CrossRef
9.
go back to reference Jang, R.H., Kang, J., Mohaisen, A., Nyang, D.H.: Rogue access point detector using characteristics of channel overlapping in 802.11n. In: IEEE International Conference on Distributed Computing Systems, pp. 2515–2520 (2017) Jang, R.H., Kang, J., Mohaisen, A., Nyang, D.H.: Rogue access point detector using characteristics of channel overlapping in 802.11n. In: IEEE International Conference on Distributed Computing Systems, pp. 2515–2520 (2017)
10.
go back to reference Kaushal, P.K.: Survey on evil twin attack. Int. J. Sci. Eng. Res. 4(4), 54–58 (2016) Kaushal, P.K.: Survey on evil twin attack. Int. J. Sci. Eng. Res. 4(4), 54–58 (2016)
11.
go back to reference Kremer, I., Mansour, Y., Perry, M.: Implementing the “wisdom of the crowd”. In: Fourteenth ACM Conference on Electronic Commerce, pp. 605–606 (2013) Kremer, I., Mansour, Y., Perry, M.: Implementing the “wisdom of the crowd”. In: Fourteenth ACM Conference on Electronic Commerce, pp. 605–606 (2013)
12.
go back to reference Li, M., Liu, Z., Li, J., Jia, C.: Format-preserving encryption for character data. J. Netw. 7(8), 1239 (2012) Li, M., Liu, Z., Li, J., Jia, C.: Format-preserving encryption for character data. J. Netw. 7(8), 1239 (2012)
13.
go back to reference Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78, 778–788 (2018)CrossRef Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 78, 778–788 (2018)CrossRef
14.
go back to reference Liu, Z., Luo, D., Li, J., Chen, X., Jia, C.: N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2), 384–400 (2016)MathSciNetCrossRef Liu, Z., Luo, D., Li, J., Chen, X., Jia, C.: N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2), 384–400 (2016)MathSciNetCrossRef
15.
go back to reference Mustafa, H., Xu, W.: CETAD: detecting evil twin access point attacks in wireless hotspots. In: Communications and Network Security, pp. 238–246 (2014) Mustafa, H., Xu, W.: CETAD: detecting evil twin access point attacks in wireless hotspots. In: Communications and Network Security, pp. 238–246 (2014)
16.
go back to reference Nivangune, M.K., Vanjale, S., Vanjale, M.: A survey on unauthorized AP detection in WLAN by measuring DNS RTT 4 (2013) Nivangune, M.K., Vanjale, S., Vanjale, M.: A survey on unauthorized AP detection in WLAN by measuring DNS RTT 4 (2013)
17.
go back to reference Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449–462 (2012). Mobicom 2008CrossRef Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449–462 (2012). Mobicom 2008CrossRef
18.
go back to reference Tang, Z., et al.: Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mob. Inf. Syst. 2017(4), 1–14 (2017) Tang, Z., et al.: Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mob. Inf. Syst. 2017(4), 1–14 (2017)
19.
go back to reference Wei, W., Jaiswal, S., Kurose, J., Towsley, D., Suh, K., Wang, B.: Identifying 802.11 traffic from passive measurements using iterative bayesian inference. IEEE/ACM Trans. Network. 20(2), 325–338 (2012)CrossRef Wei, W., Jaiswal, S., Kurose, J., Towsley, D., Suh, K., Wang, B.: Identifying 802.11 traffic from passive measurements using iterative bayesian inference. IEEE/ACM Trans. Network. 20(2), 325–338 (2012)CrossRef
20.
go back to reference Yan, W., Wang, Q., Gao, Z.: Smart home implementation based on internet and WiFi technology. In: Control Conference, pp. 9072–9077 (2015) Yan, W., Wang, Q., Gao, Z.: Smart home implementation based on internet and WiFi technology. In: Control Conference, pp. 9072–9077 (2015)
21.
go back to reference Yang, C., Song, Y., Gu, G.: Active user-side evil twin access point detection using statistical techniques. IEEE Trans. Inf. Forensics Secur. 7(5), 1638–1651 (2012)CrossRef Yang, C., Song, Y., Gu, G.: Active user-side evil twin access point detection using statistical techniques. IEEE Trans. Inf. Forensics Secur. 7(5), 1638–1651 (2012)CrossRef
22.
go back to reference Yang, Z., Zhou, Z., Liu, Y.: From RSSI to CSI: Indoor localization via channel response. ACM Comput. Surv. 46(2), 1–32 (2014)CrossRef Yang, Z., Zhou, Z., Liu, Y.: From RSSI to CSI: Indoor localization via channel response. ACM Comput. Surv. 46(2), 1–32 (2014)CrossRef
Metadata
Title
Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer
Authors
Chundong Wang
Likun Zhu
Liangyi Gong
Zheli Liu
Xiuliang Mo
Wenjun Yang
Min Li
Zhaoyang Li
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_19

Premium Partner