A novel algorithm to detect Man in the Middle Attack in WLANs
Rajinder Singh1, Satish Kumar2
1Rajinder Singh*, DCSA, Panjab University SSGRC, Hoshiarpur, Punjab, India.
2Dr. Satish Kumar, DCSA, Panjab University SSGRC, Hoshiarpur, Punjab, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 1645-1650 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8401088619/2019©BEIESP | DOI: 10.35940/ijeat.F8401.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Wireless local area networks (WLANs) are growing very rapidly in recent years. With the growing popularity of the wireless network, risk of security attacks associated with wireless network is also growing. Access Points (AP) are used in many public places like airport and hospitals to provide the users internet facility. Due to the open nature of the wireless networks, it is vulnerable to many different types of threats. Main wireless threats are eavesdropping, man in the middle attack and evil twin attack etc. In this paper one such threat MITM (Man in the Middle Attack) is discussed. In this case attacker creates a Rogue Access Point (RAP) using the same parameters as that of original AP of the network, with the help of software. We propose a methodology to detect the MITM attack. Our algorithm use combination of RSSI (Received Signal Strength Indicator) value and sequence number for detecting this attack.
Keywords: MITM, RAP, RSSI, RTT.