Solution to the wireless evil-twin transmitter attack
In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn't lie about its identity. The evil-twin uses the identity of the truth teller and transmits at the same time as the truth-teller. The receivers are bound to get confused about the location of the honest transmitter. We describe an algorithm to detect such a wireless evil-twin attack, and locate the truth-teller and the evil-twin transmitter. Four-square antennas are used by the receivers to detect an attack. RSS values measured at the receivers are used by Hyperbolic Position Bounding (HPB) to locate the transmitters in the wireless network with a degree of confidence. The performance of the algorithm is tested using a simulation of a wireless network.
|, , ,|
|2010 5th International Conference on Risks and Security of Internet and Systems, CRiSIS 2010|
|Organisation||School of Computer Science|
Bhatia, P. (Payal), Laurendeau, C, & Barbeau, M. (2010). Solution to the wireless evil-twin transmitter attack. Presented at the 2010 5th International Conference on Risks and Security of Internet and Systems, CRiSIS 2010. doi:10.1109/CRISIS.2010.5764921