ETGuard: Detecting D2D Attacks using Wireless Evil Twins

03/14/2019
by   Vineeta Jain, et al.
0

In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The attack leverages the captive portal facility of wireless networks to launch D2D attack. We configure an ET to launch a malicious component of an already installed app in the device on submission of the portal page. In this paper, we present an online, incremental, automated, fingerprinting based pre-association detection mechanism named as ETGuard which works as a client-server mechanism in real-time. The fingerprints are constructed from the beacon frames transmitted by the wireless APs periodically to inform client devices of their presence and capabilities in a network. Once detected, ETGuard continuously transmits deauthentication frames to prevent clients from connecting to an ET. ETGuard outperforms the existing state-of-the-art techniques from various perspectives. Our technique does not require any expensive hardware, does not modify any protocols, does not rely on any network specific parameters such as Round Trip Time (RTT), number of hops, etc., can be deployed in a real network, is incremental, and operates passively to detect ETs in real-time. To evaluate the efficiency, we deploy ETGuard in 802.11a/b/g wireless networks. The experiments are conducted using 12 different attack scenarios where each scenario differs in the source used for introducing an ET. ETGuard effectively detects ETs introduced either through a hardware, software, or mobile hotspot with high accuracy, only one false positive scenario, and no false negatives.

READ FULL TEXT
research
10/19/2018

IoT-KEEPER: Securing IoT Communications in Edge Networks

The increased popularity of IoT devices have made them lucrative targets...
research
12/16/2017

Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT

Security problems in environments hosting Internet-of-Things (IoT) devic...
research
12/16/2020

Next Generation Opportunistic Networking in Beyond 5G Networks

Beyond 5G networks are expected to support massive traffic through decen...
research
11/13/2018

Detection and Prevention Against RTS Attacks in Wireless LAN

Widely deployed wireless network devices use a shared medium to communic...
research
09/27/2019

Relay-assisted Device-to-Device Networks: Connectivity and Uberization Opportunities

It has been shown that deploying device-to-device (D2D) networks in urba...
research
06/25/2018

A Proactive Scalable Approach for Reliable Cluster Formationin Wireless Networks with D2D Offloading

With the current exponential growth in traffic and service demands, devi...
research
01/13/2021

Towards Mobile Distributed Ledgers

Advances in mobile computing have paved the way for new types of distrib...

Please sign up or login with your details

Forgot password? Click here to reset