2014
DOI: 10.1002/wcm.2527
|View full text |Cite
|
Sign up to set email alerts
|

Detection of man‐in‐the‐middle attacks using physical layer wireless security techniques

Abstract: Compared with a wired network, a wireless network is not protected by the cable transmission medium. Information is broadcasted over the air and it can be intercepted by anyone within the transmission range. Even though the transmissions could potentially be protected by security authentication mechanisms, malicious users can still intercept the information by mimicking the characteristics of normal user or a legitimate access point. This scenario is referred as a man‐in‐the‐middle (MITM) attack. In the MITM a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…To defend against such attacks, we can apply techniques that allow us to detect an MITM attack over physical layer [303], and if one is detected, the antenna of ∂ i 's central hub, C i , can be reconfigured to randomize all channels in ∂ i [237]. This only requires a reconfigurable antenna (RA) at each central hub.…”
Section: Maximum Number Of Sskh Prfs and Defenses Against Various Att...mentioning
confidence: 99%
“…To defend against such attacks, we can apply techniques that allow us to detect an MITM attack over physical layer [303], and if one is detected, the antenna of ∂ i 's central hub, C i , can be reconfigured to randomize all channels in ∂ i [237]. This only requires a reconfigurable antenna (RA) at each central hub.…”
Section: Maximum Number Of Sskh Prfs and Defenses Against Various Att...mentioning
confidence: 99%
“…Le Wang et al proposed in 2016 an approach to detect MITM attacks based on the received signal strength indicators which indicate the power level being received by the antenna. The received indicators are processed and analyzed to detect any rogue access points using which hackers launch their MITM attacks [10] . However, this approach provides only a mechanism to detect rouge Aps on wireless networks, which are used to as a means to MITM attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It is considered that D can only receive signals via R. The two individual channels S-R and R-D experience independent block fading so that the instantaneous complex channel gains h SR and h RD are independent and fixed for a block [25][26][27][28][29]. n SR and n RD represent the receiving noises at R and D, which are circularly symmetric complex Gaussian (CSCG) random variables as n SR ∼ CN 0, σ 2 1 and n RD ∼ CN 0, σ 2 2 . As shown in Fig.…”
Section: System Model For Dual-hop Af Relayingmentioning
confidence: 99%
“…However, identifying relay nodes is of great importance in practice. Signal relaying can potentially introduce new communication security threats, such as the ghostand-leech attack [1], the man-in-the-middle attack [2], and the denial of service attack [3]. Some relay selection schemes require pre-classifying relays into trusted or untrusted groups for cooperation [4][5][6].…”
Section: Introductionmentioning
confidence: 99%