Advanced stealth man-in-the-middle attack in wpa2 encrypted wi-fi networks

Mayank Agarwal, Santosh Biswas, Sukumar Nandi

Research output: Contribution to journalArticlepeer-review

28 Scopus citations

Abstract

The Hole 196 vulnerability allows malicious insiders to inject spoofed broadcast/multicast frames encrypted with group transient key in the Wi-Fi Protected Access II (WPA2) enabled Wi-Fi networks. In this letter, we propose a novel insider attack-Advanced Stealth Man-in-The-Middle (ASMiTM) that combines Stealth Man-in-The-Middle (SMiTM) and Wireless Denial of Service (WDoS) attacks, both of which occur due to the Hole 196 vulnerability. ASMiTM attack results in an increased duration of attack life, tougher detection, and improved stealthiness as compared to individual SMiTM and WDoS attacks.

Original languageEnglish
Article number7031876
Pages (from-to)581-584
Number of pages4
JournalIEEE Communications Letters
Volume19
Issue number4
DOIs
StatePublished - 1 Apr 2015
Externally publishedYes

Keywords

  • 802.11 Wi-Fi Network
  • Group Transient Key
  • Hole 196
  • Stealth MiTM

ASJC Scopus subject areas

  • Modeling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Advanced stealth man-in-the-middle attack in wpa2 encrypted wi-fi networks'. Together they form a unique fingerprint.

Cite this