2024
DOI: 10.1109/access.2024.3362803
|View full text |Cite
|
Sign up to set email alerts
|

A Signature-Based Wireless Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks

Manesh Thankappan,
Helena Rifà-Pous,
Carles Garrigues

Abstract: One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN). MC-MitM attacks are possible on any client no matter how the client authenticates with the AP. Key reinstallation attacks (KRACK) in 2017-18, and the latest FragAttacks in 2021 are frontline MC-MitM attacks that widely impacted millions of Wi-Fi systems, especially those with Internet of Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 36 publications
0
0
0
Order By: Relevance
“…The study of IoT Security Attack Types, Application Areas, Challenges, and Mitigation Strategies as discussed in Table 13 is a vital exploration that encompasses the multifaceted landscape of IoT security. By analyzing different attack types such as botnet attacks that are used to compromise numerous connected systems, spoofing (Reddy et al, 2024;Xu et al, 2024) which is an act of deceiving, and man-in-the-middle attacks (Bin Muzammil et al, 2024;Thankappan et al, 2024) that alters the communication between two parties, researchers gain insights into the vulnerabilities and risks faced by IoT systems. Understanding the application areas impacted by these attacks, including smart homes, industrial automation, and healthcare, highlights the potential consequences and the need for robust security measures.…”
Section: Discussionmentioning
confidence: 99%
“…The study of IoT Security Attack Types, Application Areas, Challenges, and Mitigation Strategies as discussed in Table 13 is a vital exploration that encompasses the multifaceted landscape of IoT security. By analyzing different attack types such as botnet attacks that are used to compromise numerous connected systems, spoofing (Reddy et al, 2024;Xu et al, 2024) which is an act of deceiving, and man-in-the-middle attacks (Bin Muzammil et al, 2024;Thankappan et al, 2024) that alters the communication between two parties, researchers gain insights into the vulnerabilities and risks faced by IoT systems. Understanding the application areas impacted by these attacks, including smart homes, industrial automation, and healthcare, highlights the potential consequences and the need for robust security measures.…”
Section: Discussionmentioning
confidence: 99%