Empreu aquest identificador per citar o enllaçar aquest ítem: http://hdl.handle.net/10609/149056
Registre complet de metadades
Camp DCValorLlengua/Idioma
dc.contributor.authorThankappan, Manesh-
dc.contributor.authorRifà-Pous, Helena-
dc.contributor.authorGarrigues, Carles-
dc.date.accessioned2023-10-19T13:45:06Z-
dc.date.available2023-10-19T13:45:06Z-
dc.date.issued2022-12-30-
dc.identifier.citationThankappan, M. [Manesh]. Rifà-Pous, H. [Helena], & Garrigues, C. [Carles]. (2022). Multi-channel man-in-the-middle attacks against protected wi-fi networks: a state of the art review. Expert Systems with Applications, 210, 118401. doi: 10.1016/j.eswa.2022.118401-
dc.identifier.issn0957-4174MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/149056-
dc.description.abstractMulti-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation attacks (KRACK) in 2017, and recently FragAttacks in 2021, which widely impacted millions of Wi-Fi devices, especially IoT devices. To the best of our knowledge, there are no studies in the literature that holistically review the different types of Multi-Channel MitM enabled attacks and analyze their potential impact. To this end, we evaluate the capabilities of Multi-Channel MitM and review every reported attack in the state of the art. We examine practical issues that hamper the total adoption of protection mechanisms, i.e., security patches and Protected Management Frames (PMF), and review available defense mechanisms in confronting the Multi-Channel MitM enabled attacks in the IoT context. Finally, we highlight the potential research problems and identify future research approaches in this field.en
dc.format.mimetypeapplication/pdfca
dc.language.isoengca
dc.publisherElsevierca
dc.relation.ispartofExpert Systems with Applications, 2022, (210), 118401-
dc.relation.isreferencedbyhttps://plu.mx/plum/a/?doi=10.1016/j.eswa.2022.118401&theme=plum-sciencedirect-theme&hideUsage=true-
dc.relation.urihttps://www.sciencedirect.com/science/article/pii/S0957417422015093?via%3Dihub-
dc.rightsCC BY-NC-ND-
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/-
dc.subjectwi-fien
dc.subjectWPAen
dc.subjectMan-in-the-Middle (MitM)en
dc.subjectMulti-Channel MitM (MC-MitM)en
dc.subjectKRACKen
dc.subjectInternet of Things (IoT)en
dc.subjectencryptionen
dc.subjectsecurityen
dc.subjectFragAttacksen
dc.titleMulti-channel man-in-the-middle attacks against protected wi-fi networks: a state of the art reviewca
dc.typeinfo:eu-repo/semantics/review-
dc.rights.accessRightsinfo:eu-repo/semantics/OpenAccess-
dc.identifier.doihttps://doi.org/10.1016/j.eswa.2022.118401-
dc.gir.idAR/0000009903-
dc.relation.projectIDinfo:eu-repo/grantAgreement/RTI2018-095775-B-C43-
dc.type.versioninfo:eu-repo/semantics/publishedVersion-
Apareix a les col·leccions:Articles cientÍfics
Articles

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
Thankappan_eswa_multi.pdf7,33 MBAdobe PDFThumbnail
Veure/Obrir
Comparteix:
Exporta:
Consulta les estadístiques

Aquest ítem està subjecte a una llicència de Creative CommonsLlicència Creative Commons Creative Commons