...
首页> 外文期刊>Mobile Information Systems >Exploiting Wireless Received Signal Strength Indicators tc Detect Evil-Twin Attacks in Smart Homes
【24h】

Exploiting Wireless Received Signal Strength Indicators tc Detect Evil-Twin Attacks in Smart Homes

机译:利用无线接收信号强度指示器tc检测智能家居中的邪恶双胞胎攻击

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.
机译:Evil-Twin在智能家居环境中正成为一种常见的攻击,攻击者可以在其中建立伪造的AP来危及所连接设备的安全性。为了识别伪造的AP,当前检测Evil-Twin攻击的方法都依赖于诸如SSID,真实AP的MAC地址或网络流量模式之类的信息。但是,攻击者可能会伪造此类信息,从而经常导致较低的检测率和较弱的保护。本文提出了一种基于接收信号强度指示符(RSSI)的新的邪恶双胞胎攻击检测方法。我们的方法将RSSI视为AP的指纹,并使用真正AP的指纹来识别伪造的AP。我们提供了两种方案,可以通过利用Wi-Fi信号的多径效应,在两种不同的情况下检测伪造的AP,在这种情况下,真正的AP可以位于属性中的单个或多个位置。与以前的工作有所不同,我们的方法不依赖任何专业的测量设备。实验结果表明,我们的方法可以成功地检测到90%的虚假AP,而代价是一次性的,适度的连接延迟。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号