Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

03/01/2022
by   Manesh Thankappan, et al.
0

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted Wi-Fi wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting WPA Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation Man-in-the-Middle (MitM) attacks (KRACK) in 2017, and recently FragAttacks in 2021, which widely impacted millions of Wi-Fi Multi-Channel MitM (MC-MitM) devices, especially IoT devices. To the best of our knowledge, there are no studies in the literature that KRACK holistically review the different types of Multi-Channel MitM enabled attacks and analyze their potential Internet of Things (IoT) impact. To this end, we evaluate the capabilities of Multi-Channel MitM and review every reported attack in Encryption the state of the art. We examine practical issues that hamper the total adoption of protection mechanisms, i.e., Security security patches and Protected Management Frames (PMF), and review available defense mechanisms in FragAttacks confronting the Multi-Channel MitM enabled attacks in the IoT context. Finally, we highlight the potential research problems and identify future research lines in this field.

READ FULL TEXT

page 1

page 6

page 18

research
10/02/2020

A State-of-the-Art Review on IoT botnet Attack Detection

The Internet as we know it Today, comprises several fundamental interrel...
research
09/06/2023

Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future

Given the exponential expansion of the internet, the possibilities of se...
research
08/04/2023

IoT and Man-in-the-Middle Attacks

This paper provides an overview of the Internet of Things (IoT) and its ...
research
12/24/2020

Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

Due to the constant increase and versatility of IoT devices that should ...
research
08/01/2019

Optimal Deployments of Defense Mechanisms for the Internet of Things

Internet of Things (IoT) devices can be exploited by the attackers as en...
research
11/20/2021

VoIP Can Still Be Exploited – Badly

VoIP phones are early representatives as well as present enhancers of th...
research
05/08/2022

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in ...

Please sign up or login with your details

Forgot password? Click here to reset