[go: up one dir, main page]

Tang et al., 2017 - Google Patents

Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes

Tang et al., 2017

View PDF @Full View
Document ID
17965532897363332225
Author
Tang Z
Zhao Y
Yang L
Qi S
Fang D
Chen X
Gong X
Wang Z
Publication year
Publication venue
Mobile Information Systems

External Links

Snippet

Evil‐Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil‐Twin attacks all rely on information such as …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Tang et al. Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes
Liu et al. Real-time identification of rogue WiFi connections using environment-independent physical features
Xiao et al. Proximity-based security techniques for mobile users in wireless networks
WO2014113882A1 (en) Computer system and method for indoor geo-fencing and access control
Kristiyanto et al. Analysis of deauthentication attack on ieee 802.11 connectivity based on iot technology using external penetration test
Song et al. Enhancing Packet‐Level Wi‐Fi Device Authentication Protocol Leveraging Channel State Information
Kim et al. Online detection of fake access points using received signal strengths
CN106330935B (en) A kind of detection method for the Wi-Fi that goes fishing
US12225003B2 (en) System, device, and method of cross-channel user authentication
Branch et al. Autonomic 802.11 wireless LAN security auditing
Yu et al. A framework for detecting MAC and IP spoofing attacks with network characteristics
CN104093145A (en) An Authentication Method Between Adjacent Mobile Terminal Users
Proshkin et al. Developing models of IoT infrastructures to identify vulnerabilities and analyse threats
Lovinger et al. Detection of wireless fake access points
Lu et al. SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
CN106878241A (en) Malicious hotspot detection method and system
CN108966232B (en) Wireless Internet of Things physical layer hybrid authentication method and system based on service network
Patel et al. Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities
Chen et al. Securing emerging wireless systems: lower-layer approaches
Brassil et al. Authenticating a mobile device's location using voice signatures
DA Arisandi et al. The rogue access point identification: a model and classification review
Lu A position self-adaptive method to detect fake access points
Li et al. Discussion on privacy issues and information security in the internet of things
Najafi et al. Privacy leaks from Wi-Fi probing
Kainz et al. A simulated reconnaissance attack on a mobile device