2022
DOI: 10.1016/j.jisa.2021.103058
|View full text |Cite
|
Sign up to set email alerts
|

How is your Wi-Fi connection today? DoS attacks on WPA3-SAE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…• Given that AWID3 has much more samples, and it was created with the PMF always active, a logical assumption (which is further validated in section VI) is that this dataset will produce somewhat better classification results compared to those of AWID2. Recall that PMF protects against deauthentication and disassociation attacks, therefore, as detailed in § 5 of [21] and in [22], an attacker would need to persistently spray with unencrypted Deauthentication and Disassociation frames in an attempt to achieve DoS or choose other avenues, say, PMF protected deauthentication frames that exploit a zero-day vulnerability as given in § 6 of [19]. Based on the previous assumption, following a trial-and-error approach, we first examined the shallow classification of AWID2.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…• Given that AWID3 has much more samples, and it was created with the PMF always active, a logical assumption (which is further validated in section VI) is that this dataset will produce somewhat better classification results compared to those of AWID2. Recall that PMF protects against deauthentication and disassociation attacks, therefore, as detailed in § 5 of [21] and in [22], an attacker would need to persistently spray with unencrypted Deauthentication and Disassociation frames in an attempt to achieve DoS or choose other avenues, say, PMF protected deauthentication frames that exploit a zero-day vulnerability as given in § 6 of [19]. Based on the previous assumption, following a trial-and-error approach, we first examined the shallow classification of AWID2.…”
Section: Methodsmentioning
confidence: 99%
“…1) frame.len: The total length of a frame can be an indication of an ongoing attack, especially when analyzing protected (normal) vis-à-vis unprotected (attack) frames. For instance, with reference to AWID3 CSV Therefore, as demonstrated in [19] (refer for instance to the so-called "Radio confusion" and "Radio confusion revisited" attacks), this feature can aid in identifying impersonation or flooding assaults unfolding simultaneously over different channels. 6) radiotap.channel.type.ofdm: It is used to state if the radio channel uses OFDM modulation 4 .…”
Section: A Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The respective contemporary AP models were ASUS RT-AX88U, DIR-X1860, MR7350, AX1800, RAX40, and AX10v1, respectively. Excluding legacy or common Wi-Fi vulnerabilities [36][37][38], for such devices, an essential concern is the protection of the Wi-Fi passphrase, i.e., the key(s) to connect to the Wi-Fi network. Another major concern is the safeguarding of the user credentials used to connect to the AP's web-based management interface.…”
Section: Access Pointsmentioning
confidence: 99%
“…On the other hand, mainstream digital technologies are also in the crosshairs of a variety of threat actors. Furthermore, while the 802.11 standard has greatly advanced over the years in terms of security, recent research work indicates that even the latest defenses, say, the Simultaneous Authentication of Equals (SAE) authentication and key exchange method and the Protected Management Frames (PMF) mechanism, embraced by the most recent at the time of writing 802.11-2020 standard are not impermeable [ 2 , 3 , 4 ]. Through a security prism, the situation becomes more cumbersome and complicated, given that at least infrastructure-based Wi-Fi domains co-exist with their wired counterparts, and therefore the former can be used as a springboard for attacking the latter.…”
Section: Introductionmentioning
confidence: 99%