2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) 2021
DOI: 10.1109/ficloud49777.2021.00021
|View full text |Cite
|
Sign up to set email alerts
|

PoEx: Proof of Existence for Evil Twin Attack Prevention in Wi-Fi Personal Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…There was a group of researchers that worked to add more security and reliability to WPA3 such as in [26,27,30,32,[37][38][39][40][41]]. An intrusion detection System (IDS) was used in [26,27] to add more security to WPA3 networks, where authors implemented a signature-based IDS to detect WPA3 attacks.…”
Section: ) Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…There was a group of researchers that worked to add more security and reliability to WPA3 such as in [26,27,30,32,[37][38][39][40][41]]. An intrusion detection System (IDS) was used in [26,27] to add more security to WPA3 networks, where authors implemented a signature-based IDS to detect WPA3 attacks.…”
Section: ) Discussionmentioning
confidence: 99%
“…[38] increased the security of WPA3 through implemented encryption techniques in the physical layer based on frequency induction for OFDM signals. Proof of Existence (PoEx) scheme introduced in [39] is used to protect the network against Evil Twin attacks, where authors witnessed besides protecting the network, there are improvements done on the network through the lifetime forging and network's throughput. [30] applied Paired Token scheme to replace Pairwise Master Key (PMK) with the onetime authenticated key establishment to deliver high performance to a larger number of clients using WPA3 networks.…”
Section: ) Discussionmentioning
confidence: 99%
“…Current methods for detecting evil twin attacks rely on various types of device information, such as MAC addresses or SSID names [34,35], signal strength indicators (RSSIs) [36,37] and network traffic analysis, including TCP/IP header inspection [38], monitoring changes in Simple Network Management Protocol (SNMP) MIBs like tcpActiveOpens, tcpPassiveOpens, and tcpAttemptFails, and the use of access control lists [39]. Murugesan K. et al [40] pointed out that evil twin access points can enable an attacker to conduct further attacks, such as man-in-the-middle, flooding the network with useless data, denial of service, and service disruption. The authors emphasize Use case: In 2020, an Interior IG IT team used an evil twin to deploy a fake access point with the same name as a true access point, and then recorded the credentials of all users attempting to log on.…”
Section: Evil Twin Exploitation Techniquementioning
confidence: 99%