Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Development of a Wi-Fi Security Audit System for Detecting Evil Twin attacks and Weak Keys

Authors: Bekbussinova Azhar; Ainur Nurzhanova; Yerassyl Bolatkan;

Development of a Wi-Fi Security Audit System for Detecting Evil Twin attacks and Weak Keys

Abstract

Publication Summary: PRISMA-Guided Wi-Fi Audit & Detection Title: Operationalizing Wi-Fi Security: A Multi-Signal Audit Framework for Evil Twin Detection and Posture Assessment (2015–2025) Project Overview Despite the advent of WPA3, Wi-Fi networks remain vulnerable to Evil Twin access points and credential theft due to legacy support and misconfigurations. This research bridges the gap between theoretical protocol vulnerabilities (e.g., KRACK, Dragonblood) and practical enterprise defense. We present a deployable audit workflow grounded in a PRISMA-based systematic review of literature from the last decade. Problem Statement Existing detection heuristics often rely on single-signal data (e.g., RSSI only), which fail across diverse hardware chipsets or high-interference environments. Furthermore, security posture checks are frequently incomplete, overlooking critical exposures like PMKID leakage or risky WPA3 Transition Mode deployments. Research Objectives O1 (Detection): Achieve high-precision (~95%) Evil Twin detection with low False Positive Rates (~4%) using multi-signal fusion (RF patterns + 802.11 management semantics + active verification). O2 (Auditing): Systematically evaluate network posture, including Protected Management Frames (PMF)enforcement, PSK entropy, and EAP-TLS migration readiness. O3 (Remediation): Deliver actionable intelligence to contain rogues and rotate compromised credentials. Methodology & System Architecture Our systematic review (n=540 records identified; n=40 included) synthesized evidence from a decade of protocol breakages and detection toolchains. This evidence informed the design of our four-module audit system: Passive Scanner: Builds device fingerprints using Radiotap metadata and RSN/AKM suites. Active Verifier: Sanity-checks EAPOL/SAE behavior via directed probes. Key Auditor: Evaluates "crackability" effort and flags weak protocol states (e.g., missing PMF). Remediation Engine: Fuses evidence into a "Policy Readiness Radar" for stakeholders. Key Findings & Evaluation Multi-Signal Superiority: Evidence maps and ROC curves confirm that combining RF features with management-frame semantics significantly outperforms single-family detection methods. Policy Gaps: Many "secure" environments remain attackable due to WPA3 transition-mode downgrades and PMKID exposure in WPA2/WPA3-mixed networks. Performance: Evaluated against AWID/AWID3 datasets, the framework maintains a stable F1-score (~94.8%) on commodity hardware, making it viable for SMEs and campus environments. Keywords: Evil Twin, Rogue AP, WPA3/SAE, PMF, EAP-TLS, PMKID, PRISMA Systematic Review.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!