Weak Links in Smart Surveillance: An Empirical Security Evaluation of Evil Twin Attacks on IoT Cameras

Authors

  • Giang Anh Tuan University of Science and Technology of Hanoi
  • Nguyen Hoang Ha
  • Doan Nhat Quang
  • Le Huu Ton
  • Tran Trung Hieu

DOI:

https://doi.org/10.54654/isj.v3i26.1163

Keywords:

Evil Twin, WPA2, Wireless IP Cameras, Rogue Access Point, Deauthentication, Man-in-the-Middle

Tóm tắt

 Wireless IP cameras are vital in IoT ecosystems but remain vulnerable to Evil Twin attacks that enable device compromise and data interception. This study empirically demonstrates how Deauthentication combined with rogue access points can coerce WPA2-based cameras into attacker-controlled networks, enabling MITM interception of unencrypted streams. Experiments using a controlled testbed reveal weaknesses in AP authentication, session management, and reconnection logic. To mitigate these threats, we recommend WPA3-SAE adoption, AP fingerprinting, stronger traffic encryption, and rogue AP detection. The results highlight systemic flaws in consumer IoT cameras and outline practical defenses to enhance Wi-Fi security in surveillance systems.

Downloads

Download data is not yet available.

References

Trieu, L. H., Kien, T. C., & Hien, N. T. (2023). Study on methods to counter-measure IEEE 802.11 standard Wifi signals below 6 GHz. Journal of Science and Technology on Information Security, 2(19), 39-50. https://doi.org/10.54654/isj.v2i19.980

A. Yeboah-Ofori and A. Hawsh, Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users, Sept. 2023.

Z. Neal and K. Sha, Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras, Oct. 2023.

G. Zarpelão, R. Miani, C. Kawakani, and S. de Alvarenga, “A Survey of Intrusion Detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017.

M. S. Gast, 802.11 Wireless Networks: The Definitive Guide, 2nd ed., O’Reilly Media, 2005.

Y. Lin, Y. Gao, B. Li, and W. Dong, “Accurate and Robust Rogue Access Point Detection with ClientAgnostic Wireless Fingerprinting,” in Proc. IEEE Int. Conf. on Pervasive Computing and Communications (PerCom), Mar. 2020, pp. 1–10.

R. Jang, J. Kang, A. Mohaisen, and D. Nyang, “Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference,” IEEE Trans. Mobile Computing, vol. 19, no. 9, pp. 2154–2167, Sept. 2020.

W. Liu and P. Papadimitratos, “Position-based Rogue Access Point Detection,” in Proc. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul. 2024, pp. 1–9.

A. Burns, L. Wu, X. Du, and L. Zhu, “A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks,” in Proc. IEEE Global Communications Conference (GLOBECOM), Dec. 2017, pp. 1–6.

Thang, V. V., Pantiukhin, D. V. ., Quyen, B. T. T. ., & Vu, V. V. (2023). A review of neural networks for rare intrusions detection in wireless networks. Journal of Science and Technology on Information Security, 3(20), 23-34. https://doi.org/10.54654/isj.v3i20.984

Q. Pu, J. K.-Y. Ng, M. Zhou, and J. Wang, “A Joint Rogue Access Point Localization and Outlier Detection Scheme Leveraging Sparse Recovery Technique,” IEEE Trans. Vehicular Technology, vol. 70, no. 2, pp. 1520–1532, Feb. 2021.

Q. Pu, J. K.-Y. Ng, S. Deng, and F. Zhang, “Rogue Access Point Localization Leveraging Compressive Sensing via Kernel Optimization,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), May 2020, pp. 1–6.

P. Shrivastava, M. S. Jamal, and K. Kataoka, “EvilScout: Detection and Mitigation of Evil Twin Attack in SDN Enabled WiFi,” IEEE Trans. Network and Service Management, vol. 17, no. 1, pp. 206–219, Mar. 2020.

C. Wang, X. Zheng, Y. Chen, and J. Yang, “Locating Rogue Access Point Using Fine-Grained Channel Information,” IEEE Trans. Mobile Computing, vol. 16, no. 9, pp. 2560–2573, Sept. 2017.

Z. Yang, Q. Lu, H. Zhang, F. Chen, and H. Xian, “Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification,” IEEE Internet of Things Journal, vol. 11, no. 7, pp. 11893–11905, Apr. 2024.

N. S. Selvarathinam, A. K. Dhar, and S. Biswas, “Evil Twin Attack Detection Using Discrete Event Systems in IEEE 802.11 Wi-Fi Networks,” in Proc. IEEE Mediterranean Conf. on Control and Automation (MED), Jul. 2019, pp. 316–321.

Downloads

Abstract views: 243 / PDF downloads: 39

Published

2025-12-31

How to Cite

Tuan, G. A., Ha, N. H., Quang, D. N., Ton, L. H., & Hieu, T. T. (2025). Weak Links in Smart Surveillance: An Empirical Security Evaluation of Evil Twin Attacks on IoT Cameras. Journal of Science and Technology on Information Security, 3(26), 62-69. https://doi.org/10.54654/isj.v3i26.1163

Issue

Section

Papers