Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers t...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...
Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports a...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
Evil-twin is one of most commonly attacks in the WIFI environments, with which an attacker can steal...
Existing network detection techniques rely on SSIDs, network patterns or MAC addresses of genuine wi...
peer reviewedCommonly used identifiers for IEEE 802.11 access points (APs), such as network name (S...
Existing network detection techniques rely on SSIDs, network patterns or MAC addresses of genuine wi...
The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiqui...
Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSS...
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one...
The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiqui...
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one...
Spoofing the identity of a WiFi access point (AP) is trivial. Consequently, an adversary can imperso...
This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless n...
An evil twin access point is an illegitimate access point that masquerades as a legitimate access po...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...
Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports a...
One of the main problems in open wireless networks is the inability of authenticating the identity o...
Evil-twin is one of most commonly attacks in the WIFI environments, with which an attacker can steal...
Existing network detection techniques rely on SSIDs, network patterns or MAC addresses of genuine wi...
peer reviewedCommonly used identifiers for IEEE 802.11 access points (APs), such as network name (S...
Existing network detection techniques rely on SSIDs, network patterns or MAC addresses of genuine wi...
The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiqui...
Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSS...
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one...
The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiqui...
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one...
Spoofing the identity of a WiFi access point (AP) is trivial. Consequently, an adversary can imperso...
This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless n...
An evil twin access point is an illegitimate access point that masquerades as a legitimate access po...
Journal ArticleWe explore the use of clock skew of a wireless local area network access point (AP) a...
Complimentary open Wi-Fi networks offered by most coffee shops, fast food restaurants and airports a...
One of the main problems in open wireless networks is the inability of authenticating the identity o...