Review on Wi-Fi Attacks and Detection Methods

  • Chapter
  • First Online:
Information Technology Security

Abstract

This work summarizes various attacks performed on Wi-Fi networks and their impacts of it with mitigations. Attacks are classified based on WPA2 and WPA3. Different detection methods, including signature and anomaly-based, are used to prevent Wi-Fi attacks. Attack and detection methods are examined with a Wi-Fi Intrusion Detection system for various possible scenarios. A Wi-Fi auditing framework that can perform all Wi-Fi network-based attacks for testing the network and its features are investigated. Finally, future trends in Wi-Fi Intrusion Detection systems are studied and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Abbreviations

Wi-Fi:

Wireless Fidelity

AP:

Access Point

IDS:

Intrusion Detection System

IPS:

Intrusion Prevention System

WIDS:

Wi-Fi Intrusion Detection System

SDN:

Software Define Network

SAE:

Simultaneous Authentication of Equals

WPA:

Wireless Protected Access

TCP:

Transmission Control Protocol

IP:

Internet Protocol

MAC:

Medium access control

WLAN:

Wireless Local Area Network

SYN:

TCP Synchronization

ACK:

Acknowledgement

ARP:

Address Resolution Protocol

SSID:

Service Set Identifier

DOS:

Denial of Service

DDOS:

Distributed Denial of Service

IOT:

Internet of Things

EAPOL:

Extensible Authentication Protocol over LAN

References

  1. https://datatracker.ietf.org/doc/html/rfc7494, last accessed 18 June 2023

  2. https://datatracker.ietf.org/doc/rfc5416/, last accessed 18 June 2023

  3. Martínez A et al (2008) Beacon frame spoofing attack detection in IEEE 802.11 networks. In: 2008 third international conference on availability, reliability, and security. IEEE

    Google Scholar 

  4. Thomas AM et al (2021) Evaluation of wireless AP security and best practices for mitigation. In: 2021 5th international conference on electrical, electronics, communication, computer technologies and optimization techniques (ICEECCOT). IEEE

    Google Scholar 

  5. Al-Nuaimi MAS, Ibrahim AA (2023) Analyzing and detecting the de-authentication attack by creating an automated scanner using Scapy

    Google Scholar 

  6. Sudar C, Arjun SK, Deepthi LR (2017) Time-based one-time password for Wi-Fi authentication and security. In: 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE

    Google Scholar 

  7. Shrivastava P, Jamal MS, Kataoka K (2020) EvilScout: detection and mitigation of evil twin attack in SDN enabled WiFi. IEEE Trans Netw Service Manag 17(1):89–102

    Google Scholar 

  8. Vanhoef M et al (2023) Testing and improving the correctness of Wi-Fi frame injection. In: Proceedings of the 16th ACM conference on security and privacy in wireless and mobile networks. ACM

    Google Scholar 

  9. Vanhoef M (2021) Fragment and forge: breaking Wi-Fi through frame aggregation and fragmentation. In: 30th USENIX security symposium (USENIX security 21), USENIX Association, pp 161–178. https://www.usenix.org/conference/usenixsecurity21/presentation/vanhoef

  10. Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the 24th ACM conference on computer and communications security (CCS). ACM

    Google Scholar 

  11. Vanhoef M, Ronen E (2020) Dragonblood: analyzing the dragonfly handshake of WPA3 and EAP-pwd. In: IEEE symposium on security and privacy (SP). IEEE.

    Google Scholar 

  12. Feng X et al (2022) Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects. In: 2023 IEEE symposium on security and privacy (SP). IEEE Computer Society

    Google Scholar 

  13. Fung CJ, Boutaba R (2013) Design and management of collaborative intrusion detection networks. In: 2013 IFIP/IEEE international symposium on integrated network management (IM 2013). IEEE

    Google Scholar 

  14. Pleskonjic D (2003) Wireless intrusion detection systems (WIDS). In: 19th annual computer security applications conference

    Google Scholar 

  15. Baharudin N et al (2015) Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11. In: 2015 5th international conference on IT convergence and security (ICITCS). IEEE

    Google Scholar 

  16. Satam P, Hariri S (2021) WIDS: an anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol. IEEE Trans Netw Serv Manag 18(1):1077–1091. https://doi.org/10.1109/TNSM.2020.3036138

  17. Satam P, Hariri S (2020) WIDS: an anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol. IEEE Trans Netw Serv Manag 18(1):1077–1091

    Article  Google Scholar 

  18. Abilesh Raja G et al (2022) Detection of Log4j attack in SDN environment. In: International conference on information and communication technology for competitive strategies. Springer Nature Singapore, Singapore

    Google Scholar 

  19. Abhiram D, Harish R, Praveen K (2022) Zero-trust security implementation using SDP over VPN. In: Inventive communication and computational technologies: proceedings of ICICCT 2021. Springer, Singapore

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Praveen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Harish, R., Praveen, K. (2024). Review on Wi-Fi Attacks and Detection Methods. In: Gountia, D., Dalei, D.K., Mishra, S. (eds) Information Technology Security. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-97-0407-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0407-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0406-4

  • Online ISBN: 978-981-97-0407-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation