Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques

"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the ne...

Full description

Bibliographic Details
Main Author: Wang, Le
Other Authors: Alexander M. Wyglinski, Advisor
Format: Others
Published: Digital WPI 2013
Subjects:
Online Access:https://digitalcommons.wpi.edu/etd-theses/992
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses
id ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-1991
record_format oai_dc
spelling ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-19912019-03-22T05:48:40Z Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques Wang, Le "In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. " 2013-08-27T07:00:00Z text application/pdf https://digitalcommons.wpi.edu/etd-theses/992 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses Masters Theses (All Theses, All Years) Digital WPI Alexander M. Wyglinski, Advisor RSSI Jamming attack rogue AP MITM Wi-Fi
collection NDLTD
format Others
sources NDLTD
topic RSSI
Jamming attack
rogue AP
MITM
Wi-Fi
spellingShingle RSSI
Jamming attack
rogue AP
MITM
Wi-Fi
Wang, Le
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
description "In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. "
author2 Alexander M. Wyglinski, Advisor
author_facet Alexander M. Wyglinski, Advisor
Wang, Le
author Wang, Le
author_sort Wang, Le
title Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
title_short Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
title_full Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
title_fullStr Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
title_full_unstemmed Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
title_sort detection of man-in-the-middle attacks using physical layer wireless security techniques
publisher Digital WPI
publishDate 2013
url https://digitalcommons.wpi.edu/etd-theses/992
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1991&context=etd-theses
work_keys_str_mv AT wangle detectionofmaninthemiddleattacksusingphysicallayerwirelesssecuritytechniques
_version_ 1719006306516336640