DocumentCode
1782747
Title
CETAD: Detecting evil twin access point attacks in wireless hotspots
Author
Mustafa, Hossen ; Wenyuan Xu
Author_Institution
Univ. of South Carolina, Columbia, SC, USA
fYear
2014
fDate
29-31 Oct. 2014
Firstpage
238
Lastpage
246
Abstract
Wireless hotspots allow users to use Internet via Wi-Fi interface, and many shops, cafés, parks, and airports provide free wireless hotspot services to attract customers. However, there is no authentication mechanism of Wi-Fi access points (APs) available in such hotspots, which makes them vulnerable to evil twin AP attacks. Such attacks are harmful because they allow to steal sensitive data from users. Today, there is no client-side mechanism that can effectively detect an evil twin AP attack without additional infrastructure supports. In this paper, we propose a mechanism CETAD leveraging public servers to detect such attacks. CETAD only requires installing an app at the client device and does not require to change the hotspot APs. CETAD explores the similarities between the legitimate APs and discrepancies between evil twin APs, and legitimate ones to detect an evil twin AP attack. Through our implementation and evaluation, we show that CETAD can detect evil twin AP attacks in various scenarios effectively.
Keywords
Internet; security of data; wireless LAN; CETAD leveraging public servers; Internet; Wi-Fi access points; Wi-Fi interface; airports; authentication mechanism; client-side mechanism; evil twin AP attacks; evil twin access point attack detection; free wireless hotspot services; infrastructure supports; wireless hotspots; Communication system security; IEEE 802.11 Standards; Internet; Security; Servers; Wireless communication; Wireless sensor networks; Android; Wi-Fi Security; Wireless Hotspot;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location
San Francisco, CA
Type
conf
DOI
10.1109/CNS.2014.6997491
Filename
6997491
Link To Document