Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 1248578, 14 pages
https://doi.org/10.1155/2017/1248578
Research Article

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

1School of Information Science and Technology, Northwest University, Xi’an, China
2School of Computing and Communications, Lancaster University, Lancaster, UK

Correspondence should be addressed to Dingyi Fang; nc.ude.uwn@fyd and Zheng Wang; ku.ca.retsacnal@gnaw.z

Received 20 September 2016; Accepted 21 November 2016; Published 17 January 2017

Academic Editor: Qingchen Zhang

Copyright © 2017 Zhanyong Tang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Chan, D. Estève, C. Escriba, and E. Campo, “A review of smart homes—present state and future challenges,” Computer Methods and Programs in Biomedicine, vol. 91, no. 1, pp. 55–81, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Schulz-Zander, L. Suresh, N. Sarrar, A. Feldmann, T. Hühn, and R. Merz, “Programmatic orchestration of wifi networks,” in Proceedings of the USENIX Annual Technical Conference (USENIX ATC '14), pp. 347–358, USENIX Association, Philadelphia, Pa, USA, June 2014.
  3. F. Lanze, A. Panchenko, I. Ponce-Alcaide, and T. Engel, “Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11,” in Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet '14), pp. 87–94, ACM, Québec, Canada, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Zhang, X. Zheng, Z. Tang et al., “Privacy leakage in mobile sensing: your unlock passwords can be leaked through wireless hotspot functionality,” Mobile Information Systems, vol. 2016, Article ID 8793025, 14 pages, 2016. View at Publisher · View at Google Scholar
  5. D. A. D. Zovi and S. A. Macaulay, “Attacking automatic wireless network selection,” in Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC '05), pp. 365–372, West Point, NY, USA, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data feature learning,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1351–1362, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  7. J. Herzen, R. Merz, and P. Thiran, “Distributed spectrum assignment for home WLANs,” in Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM '13), pp. 1573–1581, Turin, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. O. Nakhila, E. Dondyk, M. F. Amjad, and C. Zou, “User-side Wi-Fi evil twin attack detection using SSL/TCP protocols,” in Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC '15), pp. 239–244, IEEE, January 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, “Active behavioral fingerprinting of wireless devices,” in Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), pp. 56–61, New York, NY, USA, 2008.
  10. J. Cache, “Fingerprinting 802.11 implementations via statistical analysis of the duration field,” Uninformed.org, vol. 5, 2006. View at Google Scholar
  11. D. McCoy, J. Franklin, J. Van Randwyk, D. Sicker, and P. Tabriz, Passive data-link layer 802.11 wireless device driver fingerprinting, January 2006.
  12. L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, “Identifying unique devices through wireless fingerprinting,” in Proceedings of the ACM Conference on Wireless Network Security (WISEC '08), pp. 46–55, Alexandria, Va, USA, April 2008.
  13. C. Neumann, O. Heen, and S. Onno, “An empirical study of passive 802.11 device fingerprinting,” in Proceedings of the 32nd IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW '12), pp. 593–602, Macau, China, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, “Rogue access point detection using temporal traffic characteristics,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), vol. 4, pp. 2271–2275, Dallas, Tex, USA, November 2004. View at Publisher · View at Google Scholar
  15. W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, “Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs,” in Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC '07), pp. 365–378, ACM, San Diego, Calif, USA, October 2007.
  16. H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, “A timing-based scheme for rogue AP detection,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 11, pp. 1912–1925, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. C. D. Mano, A. Blaich, Q. Liao et al., “Ripps: rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning,” ACM Transactions on Information and System Security, vol. 11, no. 2, article no. 2, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Qu and M. M. Nefcy, “RAPiD: an indirect rogue access points detection system,” in Proceedings of the IEEE 29th International Performance Computing and Communications Conference (IPCCC '10), pp. 9–16, IEEE, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. K. S. A. P. Levis, “Rssi is under appreciated,” in Proceedings of the 3rd Workshop on Embedded Networked Sensors, vol. 3031, p. 239242, Cambridge, Mass, USA, 2006.
  20. D. Kotz, C. Newport, R. S. Gray, J. Liu, Y. Yuan, and C. Elliott, “Experimental evaluation of wireless simulation assumptions,” in Proceedings of the 7th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM MSWiM '04), pp. 78–82, ACM, Venice, Italy, October 2004. View at Scopus
  21. N. Patwari, A. O. Hero III, M. Perkins, N. S. Correal, and R. J. O'Dea, “Relative location estimation in wireless sensor networks,” IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2137–2148, 2003. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Kotaru, K. Joshi, D. Bharadia, and S. Katti, “Spotfi: decimeter level localization using wifi,” SIGCOMM Computer Communication Review, vol. 45, no. 4, pp. 269–282, 2015. View at Publisher · View at Google Scholar
  23. K. Wu, J. Xiao, Y. Yi, M. Gao, and L. M. Ni, “FILA: fine-grained indoor localization,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 2210–2218, Orlando, Fla, USA, March 2012.
  24. A. Rai, K. K. Chintalapudi, V. N. Padmanabhan, and R. Sen, “Zee: zero-effort crowdsourcing for indoor localization,” in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom '12), pp. 293–304, ACM, Istanbul, Turkey, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. H. Liu, Y. Gan, J. Yang et al., “Push the limit of WiFi based localization for smartphones,” in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom '12), pp. 305–316, ACM, Istanbul, Turkey, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Sen, J. Lee, K.-H. Kim, and P. Congdon, “Avoiding multipath to revive inbuilding WiFi localization,” in Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '13), pp. 249–262, ACM, Taipei, Taiwan, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  27. J. Schulz-Zander, C. Mayer, B. Ciobotaru, S. Schmid, A. Feldmann, and R. Riggio, “Programming the home and enterprise WiFi with OpenSDWN,” in Proceedings of the ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15), pp. 117–118, ACM, London, UK, August 2015. View at Publisher · View at Google Scholar
  28. N. Borisov, I. Goldberg, and D. Wagner, “Intercepting mobile communications: the insecurity of 802.11,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01), pp. 180–189, Rome, Italy, 2001. View at Publisher · View at Google Scholar
  29. E. Tews, R. P. Weinmann, and A. Pyshkin, “Breaking 104 bit wep in less than 60 seconds,” in Proceedings of the Information Security Applications, International Workshop (Wisa '07), pp. 188–202, Jeju Island, Korea, August 2007.
  30. Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, and K. Ren, “Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy,” IEEE Transactions on Dependable and Secure Computing, 2016. View at Publisher · View at Google Scholar
  31. Q. Zhang, H. Zhong, L. T. Yang, Z. Chen, and F. Bu, “Privacy preserving highorder cfs algorithm on the cloud for clustering multimedia data,” ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 12, no. 4s, pp. 66:1–66:15, 2016. View at Publisher · View at Google Scholar
  32. G. Wang, Y. Zou, Z. Zhou, K. Wu, and L. M. Ni, “We can hear you with Wi-Fi!,” in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom '14), pp. 593–604, Maui, Hawaii, USA, September 2014. View at Publisher · View at Google Scholar
  33. J. Wang, X. Chen, D. Fang, C. Q. Wu, Z. Yang, and T. Xing, “Transferring compressive-sensing-based device-free localization across target diversity,” IEEE Transactions on Industrial Electronics, vol. 62, no. 4, pp. 2397–2409, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. J. Wang and D. Katabi, “Dude, where's my card? RFID positioning that works with multipath and non-line of sight,” in Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '13), pp. 51–62, ACM, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  35. S. Kullback and R. A. Leibler, “On information and sufficiency,” The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79–86, 1951. View at Publisher · View at Google Scholar · View at MathSciNet
  36. S. Kullback, “Letter to the editor: the kullback-leibler distance,” The American Statistician, vol. 41, no. 4, pp. 340–341, 1987. View at Google Scholar
  37. Y. Wen, X. Tian, X. Wang, and S. Lu, “Fundamental limits of RSS fingerprinting based indoor localization,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '15), pp. 2479–2487, Hong Kong, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  38. H. Han, F. Xu, C. C. Tan, Y. Zhang, and Q. Li, “Defending against vehicular rogue aps,” in Proceedings of the IEEE INFOCOM, pp. 1665–1673, April 2011.