Abstract

In recent years, especially where 802.11 networks are involved, we have seen a rise in Man in the Middle (MiTM) attacks. In this work, we propose a novel method that maliciously exploits the BSS Transition Management frames IEEE 802.11v protocol and demonstrates how such an attack can be performed, by utilizing roaming 802.11 protocols. To the best of our knowledge, this kind of approach has not been examined in the past. Our testbed results suggest that the proposed method is successful, regardless of the legitimate and rogue access point signal strengths provided to the terminal under attack. This is not the case for other MiTM attack methods, where the signal strength provided by the rogue access point to the terminal under attack must be stronger than the legitimate access point signal strength. During the experimentation phase with our testbed, several mobile phone models were used to demonstrate the suggested technique. After demonstrating the validity of the method through the testbed, further analysis is performed with a realistic ray tracing simulator to determine practical attack distance limits in an urban environment under investigation and how an adversary can manipulate a device to connect to a rogue access point.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.