4.2 Article

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

Journal

MOBILE INFORMATION SYSTEMS
Volume 2017, Issue -, Pages -

Publisher

HINDAWI LTD
DOI: 10.1155/2017/1248578

Keywords

-

Funding

  1. National Natural Science Foundation of China [61672427, 61672428, 61272461]
  2. Key Project of Chinese Ministry of Education [211181]
  3. International Cooperation Foundation of Shaanxi Province, China [2013KW01-02, 2015 KW-003]
  4. Research Project of Shaanxi Province Department of Education [15JK1734]
  5. Research Project of NWU, China [14NW28]
  6. UK Engineering and Physical Sciences Research Council (EPSRC) [EP/M01567X/1, EP/M015793/1]
  7. Engineering and Physical Sciences Research Council [EP/M015793/1, EP/M01567X/1] Funding Source: researchfish
  8. EPSRC [EP/M01567X/1, EP/M015793/1] Funding Source: UKRI

Ask authors/readers for more resources

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI). Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available