Tang et al., 2017 - Google Patents
Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart HomesTang et al., 2017
View PDF- Document ID
- 17965532897363332225
- Author
- Tang Z
- Zhao Y
- Yang L
- Qi S
- Fang D
- Chen X
- Gong X
- Wang Z
- Publication year
- Publication venue
- Mobile Information Systems
External Links
Snippet
Evil‐Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil‐Twin attacks all rely on information such as …
- 238000001514 detection method 0 abstract description 44
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tang et al. | Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes | |
| Liu et al. | Real-time identification of rogue WiFi connections using environment-independent physical features | |
| Xiao et al. | Proximity-based security techniques for mobile users in wireless networks | |
| WO2014113882A1 (en) | Computer system and method for indoor geo-fencing and access control | |
| Kristiyanto et al. | Analysis of deauthentication attack on ieee 802.11 connectivity based on iot technology using external penetration test | |
| Song et al. | Enhancing Packet‐Level Wi‐Fi Device Authentication Protocol Leveraging Channel State Information | |
| Kim et al. | Online detection of fake access points using received signal strengths | |
| CN106330935B (en) | A kind of detection method for the Wi-Fi that goes fishing | |
| US12225003B2 (en) | System, device, and method of cross-channel user authentication | |
| Branch et al. | Autonomic 802.11 wireless LAN security auditing | |
| Yu et al. | A framework for detecting MAC and IP spoofing attacks with network characteristics | |
| CN104093145A (en) | An Authentication Method Between Adjacent Mobile Terminal Users | |
| Proshkin et al. | Developing models of IoT infrastructures to identify vulnerabilities and analyse threats | |
| Lovinger et al. | Detection of wireless fake access points | |
| Lu et al. | SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames | |
| CN106878241A (en) | Malicious hotspot detection method and system | |
| CN108966232B (en) | Wireless Internet of Things physical layer hybrid authentication method and system based on service network | |
| Patel et al. | Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities | |
| Chen et al. | Securing emerging wireless systems: lower-layer approaches | |
| Brassil et al. | Authenticating a mobile device's location using voice signatures | |
| DA Arisandi et al. | The rogue access point identification: a model and classification review | |
| Lu | A position self-adaptive method to detect fake access points | |
| Li et al. | Discussion on privacy issues and information security in the internet of things | |
| Najafi et al. | Privacy leaks from Wi-Fi probing | |
| Kainz et al. | A simulated reconnaissance attack on a mobile device |