Title :
CETAD: Detecting evil twin access point attacks in wireless hotspots
Author :
Mustafa, Hossen ; Wenyuan Xu
Author_Institution :
Univ. of South Carolina, Columbia, SC, USA
Abstract :
Wireless hotspots allow users to use Internet via Wi-Fi interface, and many shops, cafés, parks, and airports provide free wireless hotspot services to attract customers. However, there is no authentication mechanism of Wi-Fi access points (APs) available in such hotspots, which makes them vulnerable to evil twin AP attacks. Such attacks are harmful because they allow to steal sensitive data from users. Today, there is no client-side mechanism that can effectively detect an evil twin AP attack without additional infrastructure supports. In this paper, we propose a mechanism CETAD leveraging public servers to detect such attacks. CETAD only requires installing an app at the client device and does not require to change the hotspot APs. CETAD explores the similarities between the legitimate APs and discrepancies between evil twin APs, and legitimate ones to detect an evil twin AP attack. Through our implementation and evaluation, we show that CETAD can detect evil twin AP attacks in various scenarios effectively.
Keywords :
Internet; security of data; wireless LAN; CETAD leveraging public servers; Internet; Wi-Fi access points; Wi-Fi interface; airports; authentication mechanism; client-side mechanism; evil twin AP attacks; evil twin access point attack detection; free wireless hotspot services; infrastructure supports; wireless hotspots; Communication system security; IEEE 802.11 Standards; Internet; Security; Servers; Wireless communication; Wireless sensor networks; Android; Wi-Fi Security; Wireless Hotspot;
Conference_Titel :
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location :
San Francisco, CA
DOI :
10.1109/CNS.2014.6997491