首页> 外文期刊>Wireless communications & mobile computing >Detection of man-in-the-middle attacks using physical layer wireless security techniques
【24h】

Detection of man-in-the-middle attacks using physical layer wireless security techniques

机译:使用物理层无线安全技术检测中间人攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Compared with a wired network, a wireless network is not protected by the cable transmission medium. Information is broadcasted over the air and it can be intercepted by anyone within the transmission range. Even though the transmissions could potentially be protected by security authentication mechanisms, malicious users can still intercept the information by mimicking the characteristics of normal user or a legitimate access point. This scenario is referred as a man-in-the-middle (MITM) attack. In the MITM attack, the attackers can bypass the security mechanisms, intercept the unprotected transmission packets, and sniff the information. Because of several vulnerabilities in the IEEE 802.11 protocol, it is difficult to defend against a wireless MITM attack. In this paper, a received signal strength indicator (RSSI)-based detection mechanism for MITM attacks is proposed. RSSI information is an arbitrary integer that indicates the power level being received by the antenna. The random RSSI values are processed via a sliding window, yielding statistic information about the signal characteristics such as mean and standard deviation profiles. By analyzing those profiles, the detection mechanism can detect if a rogue access point, the key component of an MITM attack, is launched. Our proposed approach has been validated via hardware experimentation using Backtrack 5 tools and MATLAB software suite. Copyright (c) 2014 John Wiley & Sons, Ltd.
机译:与有线网络相比,无线网络不受电缆传输介质的保护。信息通过空中广播,传输范围内的任何人都可以截获。即使传输可能受到安全验证机制的保护,恶意用户仍然可以通过模仿普通用户或合法访问点的特征来拦截信息。这种情况称为中间人(MITM)攻击。在MITM攻击中,攻击者可以绕过安全机制,拦截不受保护的传输数据包,并嗅探信息。由于IEEE 802.11协议中存在多个漏洞,因此很难防御无线MITM攻击。本文提出了一种基于接收信号强度指示符(RSSI)的MITM攻击检测机制。 RSSI信息是一个任意整数,表示天线正在接收的功率电平。随机RSSI值通过滑动窗口进行处理,产生有关信号特征的统计信息,例如平均值和标准偏差曲线。通过分析这些配置文件,检测机制可以检测是否启动了恶意访问点(MITM攻击的关键组件)。我们提出的方法已经通过使用Backtrack 5工具和MATLAB软件套件的硬件实验进行了验证。版权所有(c)2014 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号