{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:31:32Z","timestamp":1759091492520,"version":"3.37.3"},"reference-count":9,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:00:00Z","timestamp":1559433600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379127","61827810","201813021","201105033"],"award-info":[{"award-number":["61379127","61827810","201813021","201105033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379127","61827810","201813021","201105033"],"award-info":[{"award-number":["61379127","61827810","201813021","201105033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61379127","61827810","201813021","201105033"],"award-info":[{"award-number":["61379127","61827810","201813021","201105033"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Public Science and Technology Research Fund Projects of Ocean of China","award":["61379127","61827810","201813021","201105033"],"award-info":[{"award-number":["61379127","61827810","201813021","201105033"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,6,2]]},"abstract":"<jats:p>In general, the IEEE 802.11 network identifiers used by wireless access points (APs) can be easily spoofed. Accordingly, a malicious adversary is able to clone the identity information of a legitimate AP (LAP) to launch evil twin attacks (ETAs). The evil twin is a class of rogue access point (RAP) that masquerades as a LAP and allures Wi-Fi victims\u2019 traffic. It enables an attacker with little effort and expenditure to eavesdrop or manipulate wireless communications. Due to the characteristics of strong concealment, high confusion, great harmfulness, and easy implementation, the ETA has become one of the most severe security threats in Wireless Local Area Networks (WLANs). Here, we propose a novel client-side approach, Speical Length Frames Arrival Time (<jats:italic>SLFAT<\/jats:italic>), to detect the ETA, which utilizes the same gateway as the LAP. By monitoring the traffic emitted by target APs at a detection node,<jats:italic> SLFAT<\/jats:italic> extracts the arrival time of the special frames with the same length to determine the evil twin\u2019s forwarding behavior.<jats:italic> SLFAT<\/jats:italic> is passive, lightweight, efficient, hard to be escaped. It allows users to independently detect ETA on ordinary wireless devices. Through implementation and evaluation in our study,<jats:italic> SLFAT<\/jats:italic> achieves a very high detection rate in distinguishing evil twins from LAPs.<\/jats:p>","DOI":"10.1155\/2019\/2718741","type":"journal-article","created":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T19:33:00Z","timestamp":1559503980000},"page":"1-10","source":"Crossref","is-referenced-by-count":12,"title":["<i>SLFAT<\/i>: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4816-7697","authenticated-orcid":true,"given":"Qian","family":"Lu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1564-8980","authenticated-orcid":true,"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3456-0885","authenticated-orcid":true,"given":"Yuzhan","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8814-7872","authenticated-orcid":true,"given":"Jiahui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Ocean University of China, Qingdao 266100, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2408-0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3390-x"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDP7030"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330334"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_2"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.10.010"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2718741.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2718741.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2718741.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T19:33:03Z","timestamp":1559503983000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/2718741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,2]]},"references-count":9,"alternative-id":["2718741","2718741"],"URL":"https:\/\/doi.org\/10.1155\/2019\/2718741","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,6,2]]}}}