Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the ne...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Digital WPI
2013
|
Subjects: | |
Online Access: | https://digitalcommons.wpi.edu/etd-theses/992 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses |
id |
ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-1991 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-19912019-03-22T05:48:40Z Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques Wang, Le "In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. " 2013-08-27T07:00:00Z text application/pdf https://digitalcommons.wpi.edu/etd-theses/992 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses Masters Theses (All Theses, All Years) Digital WPI Alexander M. Wyglinski, Advisor RSSI Jamming attack rogue AP MITM Wi-Fi |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
RSSI Jamming attack rogue AP MITM Wi-Fi |
spellingShingle |
RSSI Jamming attack rogue AP MITM Wi-Fi Wang, Le Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
description |
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. " |
author2 |
Alexander M. Wyglinski, Advisor |
author_facet |
Alexander M. Wyglinski, Advisor Wang, Le |
author |
Wang, Le |
author_sort |
Wang, Le |
title |
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
title_short |
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
title_full |
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
title_fullStr |
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
title_full_unstemmed |
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques |
title_sort |
detection of man-in-the-middle attacks using physical layer wireless security techniques |
publisher |
Digital WPI |
publishDate |
2013 |
url |
https://digitalcommons.wpi.edu/etd-theses/992 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses |
work_keys_str_mv |
AT wangle detectionofmaninthemiddleattacksusingphysicallayerwirelesssecuritytechniques |
_version_ |
1719006306516336640 |