A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks

02/01/2023
by   Yousri Daldoul, et al.
0

The evil twin attack is a major security threat to WLANs. An evil twin is a rogue AP installed by a malicious user to impersonate legitimate APs. It intends to attract victims in order to intercept their credentials, to steal their sensitive information, to eavesdrop on their data, etc. In this paper, we study the security mechanisms of wireless networks and we introduce the different authentication methods, including 802.1X authentication. We show that 802.1X has improved security through the use of digital certificates but does not define any practical technique for the user to check the network certificate. Therefore, it remains vulnerable to the evil twin attack. To repair this vulnerability, we introduce Robust Certificate Management System (RCMS) which takes advantage of the digital certificates of 802.1X to protect the users against rogue APs. RCMS defines a new verification code to allow the user device to check the network certificate. This practical verification combined with the reliability of digital certificates provides a perfect protection against rogue APs. RCMS requires a small software update on the user terminal and does not need any modification of IEEE 802.11. It has a significant flexibility since trusting a single AP is enough to trust all the APs of the extended network. This allows the administrators to extend their networks easily without the need to update any database of trusted APs on the user devices.

READ FULL TEXT
research
12/04/2018

An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack

IEEE 802.1X is an international standard for Port-based Network Access C...
research
02/20/2019

Misbinding Attacks on Secure Device Pairing

In identity misbinding attacks against authenticated key-exchange protoc...
research
02/22/2019

RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications

Providing a mechanism to authenticate users in healthcare applications i...
research
01/18/2019

Robust Watermarking of Neural Network with Exponential Weighting

Deep learning has been achieving top performance in many tasks. Since tr...
research
08/14/2022

Aggregation and probabilistic verification for data authentication in VANETs

Vehicular ad-hoc networks, where traffic information is distributed from...
research
04/08/2023

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Cyber attacks has always been of a great concern. Websites and services ...
research
08/16/2021

Happy MitM: Fun and Toys in Every Bluetooth Device

Bluetooth pairing establishes trust on first use between two devices by ...

Please sign up or login with your details

Forgot password? Click here to reset