Abstract
Wireless access points (APs), which allow many devices to be easily connected to the Internet, are widely used today because they offer the easiest way to connect to the Internet. With the development of the concept of Internet of Things (IoT), WiFi networks are widely used in our homes, workplaces, social areas, campus areas. With the increase of WiFi networks, attacks on these networks are constantly increasing. In this study, an IoT-based approach to detect and prevent Fake Access point attacks frequently seen in WiFi networks is proposed. A Single Board Computer (SBC) and a wireless antenna in the "Soft AP" feature are used for operation. Fake APs were detected by air scanning. In the first phase of the study, fake Access point broadcasts have been created which can create security weakness. In order to determine the fake Access points created in the second stage, SBC and wifi module were used to scan air. In the final stage, the mac address of the fake AP has been assigned to an unauthorized Virtual Local Area Network (vLAN) on the network to prevent detected fake AP broadcasts. The possible attack methods for the study were implemented and it was revealed that the proposed approach prevented the attack successfully in all scenarios. The study is seen as an effective, developed and economically useful IoT application for network administrators to prevent the attack using fake Access point.
Highlights
CONSIDERING THE increase in the number of devices connected to the Internet and the lack of the possibility of connecting to the Internet via cable on all of these devices, the use of wireless access networks such as WiFi has emerged as a practical solution [1]
The fake access point bssid mac address is assigned to an unauthorized VLAN which previously created on the backbone switch
A method is proposed against fake access points (APs) attacks which is one of the attack types in wireless WiFi networks
Summary
WEP is an encryption algorithm developed to provide security in wireless networks. L YongLei et al In order to overcome processor constraints in bruteforce attacks, they proposed distributed multi-core CPU and GPU parallel cracking method (DMCG) method In this method, WPA has used colored Petri nets to verify the 4-way handshake protocol used in the encryption method. V.Kumkar et al showed how to attack WEP, WPA, WPA2 encrypted networks. Users can connect to it by making a stronger fake broadcast with the same name as the WiFi network in the location. 4 way handshake is the IEEE-802.11i standard for secure authentication in wireless networks.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Balkan Journal of Electrical and Computer Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.