Abstract
This paper proposes KrackCover, a wireless security framework that assists in the detection of a KRACK attack with suggestions to enhance the privacy of end-users. Within KrackCover, Wi-Fi end users get an alert with suggestions when a KRACK attack is launched. Furthermore, we conduct real-world experiments by collecting data in open Wi-Fi environments including coffee shops and public libraries. Moreover, our experimental data analysis shows the applicability and effectiveness of KrackCover in the wild.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1313–1328. ACM, New York (2017)
Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)
Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. IEEE (2009)
Chin, T., Xiong, K.: MPBSD: a moving target defense approach for base station security in wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Algorithms, Systems, and Applications. IEEE (2016)
Pisa, C., Caponi, A., Dargahi, T., Bianchi, G., Blefari-Melazzi, N.: WI-FAB: attribute-based WLAN access control, without pre-shared keys and backend infrastructures, pp. 31–36 (2016)
Cheng, L., Wang, J.: How can I guard my AP?: non-intrusive user identification for mobile devices using WiFi signals. In: Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 91–100. ACM (2016)
Shen, W., Yin, B., Cao, X., Cai, L.X., Cheng, Y.: Secure device-to-device communications over WiFi direct. IEEE Netw. Mag. 30(5), 4–9 (2016)
Gallagher, S.: How the KRACK attack destroys nearly all Wi-Fi security. In: Arts Technica (2017)
TP-Link: WPA2 security (KRACKs) vulnerability statement (2018). https://www.tp-link.com/us/faq-1970.html. Accessed 18 Feb 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Chin, T., Xiong, K. (2018). KrackCover: A Wireless Security Framework for Covering KRACK Attacks. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_60
Download citation
DOI: https://doi.org/10.1007/978-3-319-94268-1_60
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94267-4
Online ISBN: 978-3-319-94268-1
eBook Packages: Computer ScienceComputer Science (R0)