Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN

Thumbnail Image

Date

2016

Journal Title

Journal ISSN

Volume Title

Publisher

Modern Education and Computer Science Press

Abstract

The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The Stealth Man-In-The-Middle (SMITM) is one of the attacks that has arisen out of the flaw in the wireless technology itself. This attack aims at stealing the data of the network users by redirecting the traffic aimed at a legitimate user towards itself. Moreover the access point or any other detection device connected to the wired media fails to detect this attack. The objective of this work is to develop a technique that would be able to detect SMITM attack efficiently. In this work we present a SMITM detection approach. Our approach detects the SIMTM attack by deploying multiple coordinated sensors. The simulation results witnessed that the proposed scheme is capable of detecting SMITM attack even in case of a mobile attacker.

Description

Keywords

Stealth Man-In-The-Middle attack, hole 196 vulnerability, wireless local area network, group temporal key, ARP cache poisoning, WLAN security

Citation

Saini, R.,& Khurana, S.S. (2016). Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the Middle Attack in WLAN. International Journal of Information Technology and Computer Science, 8(10), 37-44

Endorsement

Review

Supplemented By

Referenced By