Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the g...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2017-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2017/1248578 |
id |
doaj-35656f911f6a4bf8a122390c3b5ba3a4 |
---|---|
record_format |
Article |
spelling |
doaj-35656f911f6a4bf8a122390c3b5ba3a42021-07-02T03:27:45ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/12485781248578Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart HomesZhanyong Tang0Yujie Zhao1Lei Yang2Shengde Qi3Dingyi Fang4Xiaojiang Chen5Xiaoqing Gong6Zheng Wang7School of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Computing and Communications, Lancaster University, Lancaster, UKEvil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.http://dx.doi.org/10.1155/2017/1248578 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhanyong Tang Yujie Zhao Lei Yang Shengde Qi Dingyi Fang Xiaojiang Chen Xiaoqing Gong Zheng Wang |
spellingShingle |
Zhanyong Tang Yujie Zhao Lei Yang Shengde Qi Dingyi Fang Xiaojiang Chen Xiaoqing Gong Zheng Wang Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes Mobile Information Systems |
author_facet |
Zhanyong Tang Yujie Zhao Lei Yang Shengde Qi Dingyi Fang Xiaojiang Chen Xiaoqing Gong Zheng Wang |
author_sort |
Zhanyong Tang |
title |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes |
title_short |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes |
title_full |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes |
title_fullStr |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes |
title_full_unstemmed |
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes |
title_sort |
exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2017-01-01 |
description |
Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay. |
url |
http://dx.doi.org/10.1155/2017/1248578 |
work_keys_str_mv |
AT zhanyongtang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT yujiezhao exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT leiyang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT shengdeqi exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT dingyifang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT xiaojiangchen exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT xiaoqinggong exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes AT zhengwang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes |
_version_ |
1721341580511543296 |