Home > Research > Publications & Outputs > Exploiting wireless received signal strength in...

Electronic data

  • 1248578

    Rights statement: Copyright © 2017 Zhanyong Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

    Final published version, 2.3 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. / Tang, Zhanyong; Zhao, Yujie; Yang, Lei et al.
In: Mobile Information Systems, Vol. 2017, 1248578, 17.01.2017.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Tang, Z, Zhao, Y, Yang, L, Qi, S, Fang, D, Chen, X, Gong, X & Wang, Z 2017, 'Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes', Mobile Information Systems, vol. 2017, 1248578. https://doi.org/10.1155/2017/1248578

APA

Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X., & Wang, Z. (2017). Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mobile Information Systems, 2017, Article 1248578. https://doi.org/10.1155/2017/1248578

Vancouver

Tang Z, Zhao Y, Yang L, Qi S, Fang D, Chen X et al. Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. Mobile Information Systems. 2017 Jan 17;2017:1248578. doi: 10.1155/2017/1248578

Author

Tang, Zhanyong ; Zhao, Yujie ; Yang, Lei et al. / Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes. In: Mobile Information Systems. 2017 ; Vol. 2017.

Bibtex

@article{1fb48ef65dd242068203e71c59181504,
title = "Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes",
abstract = "Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection.This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the WIFI signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach cansuccessfully detect 90% of the fake APs, at the cost of an one-off, modest connection delay.",
author = "Zhanyong Tang and Yujie Zhao and Lei Yang and Shengde Qi and Dingyi Fang and Xiaojiang Chen and Xiaoqing Gong and Zheng Wang",
note = "Copyright {\textcopyright} 2017 Zhanyong Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.",
year = "2017",
month = jan,
day = "17",
doi = "10.1155/2017/1248578",
language = "English",
volume = "2017",
journal = "Mobile Information Systems",
issn = "1574-017X",
publisher = "Hindawi Publishing Corporation",

}

RIS

TY - JOUR

T1 - Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

AU - Tang, Zhanyong

AU - Zhao, Yujie

AU - Yang, Lei

AU - Qi, Shengde

AU - Fang, Dingyi

AU - Chen, Xiaojiang

AU - Gong, Xiaoqing

AU - Wang, Zheng

N1 - Copyright © 2017 Zhanyong Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

PY - 2017/1/17

Y1 - 2017/1/17

N2 - Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection.This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the WIFI signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach cansuccessfully detect 90% of the fake APs, at the cost of an one-off, modest connection delay.

AB - Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection.This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the WIFI signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach cansuccessfully detect 90% of the fake APs, at the cost of an one-off, modest connection delay.

U2 - 10.1155/2017/1248578

DO - 10.1155/2017/1248578

M3 - Journal article

VL - 2017

JO - Mobile Information Systems

JF - Mobile Information Systems

SN - 1574-017X

M1 - 1248578

ER -