• DocumentCode
    53847
  • Title

    Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks

  • Author

    Agarwal, Mayank ; Biswas, Santosh ; Nandi, Sukumar

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Guwahati, Guwahati, India
  • Volume
    19
  • Issue
    4
  • fYear
    2015
  • fDate
    Apr-15
  • Firstpage
    581
  • Lastpage
    584
  • Abstract
    The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled Wi-Fi networks. In this letter, we propose a novel insider attack-Advanced Stealth Man-in-The-Middle (ASMiTM) that combines Stealth Man-in-The-Middle (SMiTM) and Wireless Denial of Service (WDoS) attacks, both of which occur due to the Hole 196 vulnerability. ASMiTM attack results in an increased duration of attack life, tougher detection, and improved stealthiness as compared to individual SMiTM and WDoS attacks.
  • Keywords
    computer network security; wireless LAN; ASMiTM attack; WDoS attacks; WPA2 encrypted Wi-Fi networks; Wi-Fi protected access II; hole 196 vulnerability; novel insider attack-advanced stealth man-in-the-middle; wireless denial of service attacks; Encryption; IEEE 802.11 Standards; Protocols; Transient analysis; Wireless communication; 802.11 Wi-Fi Network; Group Transient Key; Hole 196; Stealth MiTM;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2015.2400443
  • Filename
    7031876