Documente Academic
Documente Profesional
Documente Cultură
AbstractThe Hole 196 vulnerability allows malicious insid- with lower packet number values being dropped by the client
ers to inject spoofed broadcast/multicast frames encrypted with assuming them to be replay frame(s).
group transient key in the Wi-Fi Protected Access II (WPA2) ASMiTM attack proposed in this paper prolongs the effects
enabled Wi-Fi networks. In this letter, we propose a novel in- of the individual SMiTM and WDoS attacks while preserving
sider attackAdvanced Stealth Man-in-The-Middle (ASMiTM)
that combines Stealth Man-in-The-Middle (SMiTM) and Wireless stealthiness. Furthermore, the proposed attack causes dropping
Denial of Service (WDoS) attacks, both of which occur due to the of broadcast/multicast frames leading to tougher detection as
Hole 196 vulnerability. ASMiTM attack results in an increased du- compared to the individual attacks. The probing technique
ration of attack life, tougher detection, and improved stealthiness suggested in [5] for detecting SMiTM attack fails to detect
as compared to individual SMiTM and WDoS attacks. ASMiTM attack. ASMiTM attack enables a malicious insider
Index Terms802.11 Wi-Fi Network, Group Transient Key, to steal intellectual property, clients credentials etc. without
Hole 196, Stealth MiTM. involving any brute force or key cracking. As WPA2 is one of
the most widely used encryption techniques for securing Wi-Fi
I. I NTRODUCTION networks, ASMiTM attack is a major challenge with virtually
no easy quick fix.
1558-2558 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
582 IEEE COMMUNICATIONS LETTERS, VOL. 19, NO. 4, APRIL 2015