Transmit and Deceive: Addressing the Insider Threat to Beacon Security
Zapisane w:
| Wydane w: | ProQuest Dissertations and Theses (2025) |
|---|---|
| 1. autor: | |
| Wydane: |
ProQuest Dissertations & Theses
|
| Hasła przedmiotowe: | |
| Dostęp online: | Citation/Abstract Full Text - PDF |
| Etykiety: |
Nie ma etykietki, Dołącz pierwszą etykiete!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3205837869 | ||
| 003 | UK-CbPIL | ||
| 020 | |a 9798315713197 | ||
| 035 | |a 3205837869 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 66569 |2 nlm | ||
| 100 | 1 | |a Troy, Noah | |
| 245 | 1 | |a Transmit and Deceive: Addressing the Insider Threat to Beacon Security | |
| 260 | |b ProQuest Dissertations & Theses |c 2025 | ||
| 513 | |a Dissertation/Thesis | ||
| 520 | 3 | |a IEEE 802.11 Beacon frames exist at the forefront of modern Wi-Fi networks and facilitate a wide array of essential network functionality, from discovery to time synchronization and even transmit power control. However, the central role Beacon frames play in initial network advertisement comes at the price of incomplete security guarantees, leaving these frames historically vulnerable to forgery and granting significant leverage over proximal wireless devices to a malicious actor that can effectively spoof them. With the publication of IEEE Std 802.11-2020, beacon protection was introduced to enable the authentication of received Beacon frames, placating most concerns. However, beacon protection is not a perfect solution, and cannot protect against beacon forgery perpetrated by an insider of the wireless network. As the risk of insider attack paces the growing threat from nation-state-backed cyber actors, the need has never been greater to strengthen the resiliency of wireless networks to malicious and compromised insiders. Focusing on Beacon frames in particular, this thesis sets the stage with a review of their context within a wireless network, then explores critical elements of their history, including important related work conducted by the security community. The argument is made for improving Beacon frame protection to address insider threats, and supported by the development and testing of a covert channel to demonstrate that malicious, real-time manipulation of Beacon frames is both possible and practical. The covert channel is a novel contribution developed from scratch and open-sourced to facilitate further research, based on the known ability to spoof Beacon frames with custom transmit power limits. Lastly, Enhanced Beacon Protection is proposed: a unique expansion of beacon protection designed to prevent insider forgeries while maintaining full backward compatibility and maximum efficiency. | |
| 653 | |a Computer science | ||
| 653 | |a Computer engineering | ||
| 773 | 0 | |t ProQuest Dissertations and Theses |g (2025) | |
| 786 | 0 | |d ProQuest |t Publicly Available Content Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3205837869/abstract/embedded/75I98GEZK8WCJMPQ?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3205837869/fulltextPDF/embedded/75I98GEZK8WCJMPQ?source=fedsrch |