Weak Links in Smart Surveillance: An Empirical Security Evaluation of Evil Twin Attacks on IoT Cameras
DOI:
https://doi.org/10.54654/isj.v3i26.1163Keywords:
Evil Twin, WPA2, Wireless IP Cameras, Rogue Access Point, Deauthentication, Man-in-the-MiddleTóm tắt
Wireless IP cameras are vital in IoT ecosystems but remain vulnerable to Evil Twin attacks that enable device compromise and data interception. This study empirically demonstrates how Deauthentication combined with rogue access points can coerce WPA2-based cameras into attacker-controlled networks, enabling MITM interception of unencrypted streams. Experiments using a controlled testbed reveal weaknesses in AP authentication, session management, and reconnection logic. To mitigate these threats, we recommend WPA3-SAE adoption, AP fingerprinting, stronger traffic encryption, and rogue AP detection. The results highlight systemic flaws in consumer IoT cameras and outline practical defenses to enhance Wi-Fi security in surveillance systems.
Downloads
References
Trieu, L. H., Kien, T. C., & Hien, N. T. (2023). Study on methods to counter-measure IEEE 802.11 standard Wifi signals below 6 GHz. Journal of Science and Technology on Information Security, 2(19), 39-50. https://doi.org/10.54654/isj.v2i19.980
A. Yeboah-Ofori and A. Hawsh, Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users, Sept. 2023.
Z. Neal and K. Sha, Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras, Oct. 2023.
G. Zarpelão, R. Miani, C. Kawakani, and S. de Alvarenga, “A Survey of Intrusion Detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017.
M. S. Gast, 802.11 Wireless Networks: The Definitive Guide, 2nd ed., O’Reilly Media, 2005.
Y. Lin, Y. Gao, B. Li, and W. Dong, “Accurate and Robust Rogue Access Point Detection with ClientAgnostic Wireless Fingerprinting,” in Proc. IEEE Int. Conf. on Pervasive Computing and Communications (PerCom), Mar. 2020, pp. 1–10.
R. Jang, J. Kang, A. Mohaisen, and D. Nyang, “Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference,” IEEE Trans. Mobile Computing, vol. 19, no. 9, pp. 2154–2167, Sept. 2020.
W. Liu and P. Papadimitratos, “Position-based Rogue Access Point Detection,” in Proc. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Jul. 2024, pp. 1–9.
A. Burns, L. Wu, X. Du, and L. Zhu, “A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks,” in Proc. IEEE Global Communications Conference (GLOBECOM), Dec. 2017, pp. 1–6.
Thang, V. V., Pantiukhin, D. V. ., Quyen, B. T. T. ., & Vu, V. V. (2023). A review of neural networks for rare intrusions detection in wireless networks. Journal of Science and Technology on Information Security, 3(20), 23-34. https://doi.org/10.54654/isj.v3i20.984
Q. Pu, J. K.-Y. Ng, M. Zhou, and J. Wang, “A Joint Rogue Access Point Localization and Outlier Detection Scheme Leveraging Sparse Recovery Technique,” IEEE Trans. Vehicular Technology, vol. 70, no. 2, pp. 1520–1532, Feb. 2021.
Q. Pu, J. K.-Y. Ng, S. Deng, and F. Zhang, “Rogue Access Point Localization Leveraging Compressive Sensing via Kernel Optimization,” in Proc. IEEE Wireless Communications and Networking Conference (WCNC), May 2020, pp. 1–6.
P. Shrivastava, M. S. Jamal, and K. Kataoka, “EvilScout: Detection and Mitigation of Evil Twin Attack in SDN Enabled WiFi,” IEEE Trans. Network and Service Management, vol. 17, no. 1, pp. 206–219, Mar. 2020.
C. Wang, X. Zheng, Y. Chen, and J. Yang, “Locating Rogue Access Point Using Fine-Grained Channel Information,” IEEE Trans. Mobile Computing, vol. 16, no. 9, pp. 2560–2573, Sept. 2017.
Z. Yang, Q. Lu, H. Zhang, F. Chen, and H. Xian, “Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification,” IEEE Internet of Things Journal, vol. 11, no. 7, pp. 11893–11905, Apr. 2024.
N. S. Selvarathinam, A. K. Dhar, and S. Biswas, “Evil Twin Attack Detection Using Discrete Event Systems in IEEE 802.11 Wi-Fi Networks,” in Proc. IEEE Mediterranean Conf. on Control and Automation (MED), Jul. 2019, pp. 316–321.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).










