Mobility

Detecting and Localizing Transmitters in a Wireless Evil-Twin Attack

Download Now Free registration required

Executive Summary

In a wireless network comprising some receivers and a truth-teller transmitter, an attacker adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true identity and transmits like the truth-teller transmitter in the network. The truth-teller transmitter may be a malicious transmitter as well, but it is honest in that it doesn't lie about its identity. The evil-twin uses the identity of the truth teller and transmits at the same time as the truth-teller. The receivers are bound to get confused about the location of the honest transmitter. The authors describe an algorithm to detect such a wireless evil-twin attack, and locate the truth-teller and the evil-twin transmitter.

  • Format: PDF
  • Size: 568.8 KB