2022
DOI: 10.48550/arxiv.2203.00579
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…In our previous work [13], we extensively studied the technical feasibility of various MC-MitM defense mechanisms and demonstrated that it is difficult to achieve their deployment, especially in IoT environments like smart homes. On the one hand, there are no patches for all commercial devices, and on the other hand, the management and maintenance of these devices requires technical knowledge that the standard user does not have.…”
Section: B Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [13], we extensively studied the technical feasibility of various MC-MitM defense mechanisms and demonstrated that it is difficult to achieve their deployment, especially in IoT environments like smart homes. On the one hand, there are no patches for all commercial devices, and on the other hand, the management and maintenance of these devices requires technical knowledge that the standard user does not have.…”
Section: B Motivationmentioning
confidence: 99%
“…Surprisingly, they used the MC-MitM position to capture, decrypt, and modify protected Wi-Fi packets (train control messages). In our previous work [13], we evaluated the capabilities of MC-MitM attacks and provided a detailed description of different kinds of MC-MitM attacks reported so far.…”
mentioning
confidence: 99%
“…If the victim is using encrypted DNS, the adversary can try to block these connections to induce the victim into falling back to plaintext DNS over UDP. Packets can be blocked using methods from Section 8.4 or by using a multi-channel MitM position [100,209].…”
Section: Intercepting Client Trafficmentioning
confidence: 99%
“…In our network disruption attacks of Chapter 8.4, we abused frame queues and power-save features to block frames from arriving at their destination. Though blocking frames can also be done using other methods, for example through a multi-channel MitM [209] or jamming techniques [100], our approach requires fewer resources. Performing a multi-channel MitM requires two wireless network cards, while our attacks only require one.…”
Section: Comparison To Frame-blocking Attacksmentioning
confidence: 99%