Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the g...

Full description

Bibliographic Details
Main Authors: Zhanyong Tang, Yujie Zhao, Lei Yang, Shengde Qi, Dingyi Fang, Xiaojiang Chen, Xiaoqing Gong, Zheng Wang
Format: Article
Language:English
Published: Hindawi Limited 2017-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2017/1248578
id doaj-35656f911f6a4bf8a122390c3b5ba3a4
record_format Article
spelling doaj-35656f911f6a4bf8a122390c3b5ba3a42021-07-02T03:27:45ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/12485781248578Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart HomesZhanyong Tang0Yujie Zhao1Lei Yang2Shengde Qi3Dingyi Fang4Xiaojiang Chen5Xiaoqing Gong6Zheng Wang7School of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Information Science and Technology, Northwest University, Xi’an, ChinaSchool of Computing and Communications, Lancaster University, Lancaster, UKEvil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.http://dx.doi.org/10.1155/2017/1248578
collection DOAJ
language English
format Article
sources DOAJ
author Zhanyong Tang
Yujie Zhao
Lei Yang
Shengde Qi
Dingyi Fang
Xiaojiang Chen
Xiaoqing Gong
Zheng Wang
spellingShingle Zhanyong Tang
Yujie Zhao
Lei Yang
Shengde Qi
Dingyi Fang
Xiaojiang Chen
Xiaoqing Gong
Zheng Wang
Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
Mobile Information Systems
author_facet Zhanyong Tang
Yujie Zhao
Lei Yang
Shengde Qi
Dingyi Fang
Xiaojiang Chen
Xiaoqing Gong
Zheng Wang
author_sort Zhanyong Tang
title Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
title_short Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
title_full Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
title_fullStr Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
title_full_unstemmed Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes
title_sort exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2017-01-01
description Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.
url http://dx.doi.org/10.1155/2017/1248578
work_keys_str_mv AT zhanyongtang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT yujiezhao exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT leiyang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT shengdeqi exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT dingyifang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT xiaojiangchen exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT xiaoqinggong exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
AT zhengwang exploitingwirelessreceivedsignalstrengthindicatorstodetecteviltwinattacksinsmarthomes
_version_ 1721341580511543296