论文标题
对受保护的Wi-Fi网络的多渠道人类攻击:最新的审查状态
Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review
论文作者
论文摘要
多渠道中间人(MITM)攻击是特殊的MITM攻击,能够在两个合法的终点之间操纵加密的Wi-Fi无线框架。自2014年成立以来,攻击者一直针对WPA Wi-Fi网络执行不同的攻击,例如密码降级,拒绝服务,密钥重新安装中间人(MITM)攻击(KRACK)攻击(KRACK),以及最近在2021年的fragattacks,以及2021年的Fragattacks,尤其是WI-FI Multi-Chnelel Miti-Channel Mitm(Mc)MITM(MC)MITM(MC)MITM(MC)。据我们所知,文献中没有研究可以整体回顾不同类型的多频道MITM启用攻击并分析其潜在物联网(IoT)影响(IoT)的影响。为此,我们评估了多通道MITM的功能,并审查了加密中所报告的每项攻击。我们研究了妨碍保护机制的总采用,即安全保护贴和受保护的管理框架(PMF),并查看在Iot上下文中启用多渠道MITM攻击的Fragattack中的可用防御机制。最后,我们强调了潜在的研究问题,并确定了该领域的未来研究线。
Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted Wi-Fi wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting WPA Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation Man-in-the-Middle (MitM) attacks (KRACK) in 2017, and recently FragAttacks in 2021, which widely impacted millions of Wi-Fi Multi-Channel MitM (MC-MitM) devices, especially IoT devices. To the best of our knowledge, there are no studies in the literature that KRACK holistically review the different types of Multi-Channel MitM enabled attacks and analyze their potential Internet of Things (IoT) impact. To this end, we evaluate the capabilities of Multi-Channel MitM and review every reported attack in Encryption the state of the art. We examine practical issues that hamper the total adoption of protection mechanisms, i.e., Security security patches and Protected Management Frames (PMF), and review available defense mechanisms in FragAttacks confronting the Multi-Channel MitM enabled attacks in the IoT context. Finally, we highlight the potential research problems and identify future research lines in this field.