Title :
Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks
Author :
Agarwal, Mayank ; Biswas, Santosh ; Nandi, Sukumar
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Guwahati, Guwahati, India
Abstract :
The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled Wi-Fi networks. In this letter, we propose a novel insider attack-Advanced Stealth Man-in-The-Middle (ASMiTM) that combines Stealth Man-in-The-Middle (SMiTM) and Wireless Denial of Service (WDoS) attacks, both of which occur due to the Hole 196 vulnerability. ASMiTM attack results in an increased duration of attack life, tougher detection, and improved stealthiness as compared to individual SMiTM and WDoS attacks.
Keywords :
computer network security; wireless LAN; ASMiTM attack; WDoS attacks; WPA2 encrypted Wi-Fi networks; Wi-Fi protected access II; hole 196 vulnerability; novel insider attack-advanced stealth man-in-the-middle; wireless denial of service attacks; Encryption; IEEE 802.11 Standards; Protocols; Transient analysis; Wireless communication; 802.11 Wi-Fi Network; Group Transient Key; Hole 196; Stealth MiTM;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2015.2400443