
Publication Summary: PRISMA-Guided Wi-Fi Audit & Detection Title: Operationalizing Wi-Fi Security: A Multi-Signal Audit Framework for Evil Twin Detection and Posture Assessment (2015–2025) Project Overview Despite the advent of WPA3, Wi-Fi networks remain vulnerable to Evil Twin access points and credential theft due to legacy support and misconfigurations. This research bridges the gap between theoretical protocol vulnerabilities (e.g., KRACK, Dragonblood) and practical enterprise defense. We present a deployable audit workflow grounded in a PRISMA-based systematic review of literature from the last decade. Problem Statement Existing detection heuristics often rely on single-signal data (e.g., RSSI only), which fail across diverse hardware chipsets or high-interference environments. Furthermore, security posture checks are frequently incomplete, overlooking critical exposures like PMKID leakage or risky WPA3 Transition Mode deployments. Research Objectives O1 (Detection): Achieve high-precision (~95%) Evil Twin detection with low False Positive Rates (~4%) using multi-signal fusion (RF patterns + 802.11 management semantics + active verification). O2 (Auditing): Systematically evaluate network posture, including Protected Management Frames (PMF)enforcement, PSK entropy, and EAP-TLS migration readiness. O3 (Remediation): Deliver actionable intelligence to contain rogues and rotate compromised credentials. Methodology & System Architecture Our systematic review (n=540 records identified; n=40 included) synthesized evidence from a decade of protocol breakages and detection toolchains. This evidence informed the design of our four-module audit system: Passive Scanner: Builds device fingerprints using Radiotap metadata and RSN/AKM suites. Active Verifier: Sanity-checks EAPOL/SAE behavior via directed probes. Key Auditor: Evaluates "crackability" effort and flags weak protocol states (e.g., missing PMF). Remediation Engine: Fuses evidence into a "Policy Readiness Radar" for stakeholders. Key Findings & Evaluation Multi-Signal Superiority: Evidence maps and ROC curves confirm that combining RF features with management-frame semantics significantly outperforms single-family detection methods. Policy Gaps: Many "secure" environments remain attackable due to WPA3 transition-mode downgrades and PMKID exposure in WPA2/WPA3-mixed networks. Performance: Evaluated against AWID/AWID3 datasets, the framework maintains a stable F1-score (~94.8%) on commodity hardware, making it viable for SMEs and campus environments. Keywords: Evil Twin, Rogue AP, WPA3/SAE, PMF, EAP-TLS, PMKID, PRISMA Systematic Review.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
