2021 IEEE International Conference on Cyber Security and Resilience (CSR) 2021
DOI: 10.1109/csr51186.2021.9527971
|View full text |Cite
|
Sign up to set email alerts
|

On the detection of Channel Switch Announcement Attack in 802.11 networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…However, upon considering the above attack and benign traffic CSA scenarios, we set the threshold (TH4) to 1 CSA frame to identify potential fake CSA attacks and provide a warning sign for possible MC-MitM-IV attacks. Furthermore, to verify the occurrence of CSAs, DFS detectors can be used [18]. Such detectors recognize radar pulses that require advanced device setup and increase the cost of attack detection.…”
Section: Table I the Resulting Fiat And Fdr Of Beacons In Attack And ...mentioning
confidence: 99%
See 3 more Smart Citations
“…However, upon considering the above attack and benign traffic CSA scenarios, we set the threshold (TH4) to 1 CSA frame to identify potential fake CSA attacks and provide a warning sign for possible MC-MitM-IV attacks. Furthermore, to verify the occurrence of CSAs, DFS detectors can be used [18]. Such detectors recognize radar pulses that require advanced device setup and increase the cost of attack detection.…”
Section: Table I the Resulting Fiat And Fdr Of Beacons In Attack And ...mentioning
confidence: 99%
“…However, checking beacons only on the legitimate channel is not always beneficial because there are valid reasons for an AP to switch to different channels. For example, switching the channel is essential to avoid interference from radar noise in particular channels and is a dynamic action in modern routers enabled with the Dynamic Frequency Selection (DFS) feature [18]. Furthermore, the MC-MitM attacker can use a special kind of constant jamming or reactive jamming by using cheap off-theshelf Wi-Fi dongles in order to establish the MitM position, which is relatively hard to detect by existing intrusion detection systems [6], [19].…”
Section: A Challenges In Detecting Mc-mitm Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…However, checking beacons only on the legitimate channel is not always beneficial because there are valid reasons for an AP to switch to different channels. For example, channel switching is essential to avoid interference from radar noise on certain channels, and is a dynamic action in modern routers enabled by the Dynamic Frequency Selection (DFS) feature [18]. Furthermore, the MC-MitM attacker can use a special kind of constant jamming or reactive jamming by using cheap off-the-shelf Wi-Fi dongles in order to establish the MitM position, which is relatively hard to detect by existing intrusion detection systems [6], [19].…”
Section: B Challenges In Detecting Mc-mitm Attacksmentioning
confidence: 99%