About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II

Research Article

PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-63095-9_10,
        author={Jiahui Zhang and Qian Lu and Ruobing Jiang and Haipeng Qu},
        title={PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range},
        proceedings={Security and Privacy in Communication Networks. 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II},
        proceedings_a={SECURECOMM PART 2},
        year={2020},
        month={12},
        keywords={Evil twin attack Rogue access point detection WLAN security Wi-Fi security Channel state information},
        doi={10.1007/978-3-030-63095-9_10}
    }
    
  • Jiahui Zhang
    Qian Lu
    Ruobing Jiang
    Haipeng Qu
    Year: 2020
    PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range
    SECURECOMM PART 2
    Springer
    DOI: 10.1007/978-3-030-63095-9_10
Jiahui Zhang1, Qian Lu1, Ruobing Jiang1,*, Haipeng Qu1
  • 1: Department of Computer Science and Technology
*Contact email: jrb@ouc.edu.cn

Abstract

In recent years, wireless local area networks (WLANs) have become one of the important ways to access the Internet. However, the openness of WLANs makes them vulnerable to the threat of the evil twin attack (ETA). Existing effective ETA detection solutions usually rely on physical fingerprints. Especially fingerprints made by information extracted from channel state information (CSI) are more reliable. However, demonstrated by our experiment, the fingerprint of the state-of-the-art ETA detection scheme, which is based on phase error extracted from CSI, is not stable enough, and it results in a large number of false negative results in some cases. In this paper, we present a novel ETA detection scheme, called PEDR, which uses range fingerprint extracted from CSI to identify the evil twin (ET). Inspired by the significant observation that the phase error will drift over time, the concept of drift range fingerprints is proposed and exploited to improve ETA detection accuracy in real-world attack scenarios. Range fingerprints are not affected by drift in phase error and can be uniquely identified. The proposed range fingerprint is implemented and extensive performance evaluation experiments are conducted in the large-scale experiment with 27 devices. The experimental results demonstrate that the detection rate of PEDR is close to 99% and the false negative data is only 1.11%. It is worth mentioning that PEDR is outstanding in the scenario with similar device fingerprints.

Keywords
Evil twin attack Rogue access point detection WLAN security Wi-Fi security Channel state information
Published
2020-12-12
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-63095-9_10
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL