Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN
Files
Date
2016
Journal Title
Journal ISSN
Volume Title
Publisher
Modern Education and Computer Science Press
Abstract
The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The Stealth Man-In-The-Middle (SMITM) is one of the attacks that has arisen out of the flaw in the wireless technology itself. This attack aims at stealing the data of the network users by redirecting the traffic aimed at a legitimate user towards itself. Moreover the access point or any other detection device connected to the wired media fails to detect this attack. The objective of this work is to develop a technique that
would be able to detect SMITM attack efficiently. In this
work we present a SMITM detection approach. Our
approach detects the SIMTM attack by deploying
multiple coordinated sensors. The simulation results
witnessed that the proposed scheme is capable of
detecting SMITM attack even in case of a mobile
attacker.
Description
Keywords
Stealth Man-In-The-Middle attack, hole 196 vulnerability, wireless local area network, group temporal key, ARP cache poisoning, WLAN security
Citation
Saini, R.,& Khurana, S.S. (2016). Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the Middle Attack in WLAN. International Journal of Information Technology and Computer Science, 8(10), 37-44