Detect Wi Fi de Authentication Attacks Using Esp8266 IJERTV13IS030105
Detect Wi Fi de Authentication Attacks Using Esp8266 IJERTV13IS030105
Published by :
http://www.ijert.org ISSN: 2278-0181
Volume 13, Issue 03 March 2024
Abstract—In network security, the utilization of an disconnection events. The ESP8266 can be
ESP8266 microcontroller unit (MCU) from Espressif programmed to detect such anomalies by monitoring
Systems emerges as a vigilant guardian against the frequency and timing of de-authentication
potential threats, specifically de-authentication frames. Furthermore, by looking at signal strength
attacks. These malicious endeavors involve the forceful and MAC addresses, we can spot unusual patterns
expulsion of devices from a Wi-Fi network, leading to
significant disruptions. The ESP8266, a compact yet
that might indicate an ongoing attack.
powerful Wi-Fi module, can be programmed to
diligently monitor the wireless environment for signs 2 . LITERATURE REVIEW
of such malevolent activities. The primary function of The literature review provides an overview of
this MCU node involves continuous scanning of Wi-Fi existing research in three main areas: Wireless
networks to identify and analyze de-authentication Intrusion Detection Systems (IDS), ESP8266-based
packets. These packets serve as key indicators of Security Solutions, and De-authentication Attack
attempts to disconnect devices forcefully from the
network. The ESP8266 acts as a sentinel, ever-vigilant
Mitigation Techniques.
in its observation of the network's integrity. Upon Wireless Intrusion Detection Systems (IDS): This
detecting an abnormal surge in the number of de- section highlights the importance of IDS in wireless
authentication packets, it promptly raises a networks due to their unique characteristics such as
metaphorical "blue flag," signaling the potential open air transmission, dynamic nature, and multiple
presence of a de-authentication attack. In essence, the protocols. It emphasizes the need for specialized
ESP8266 operates as a proactive defender, scrutinizing security systems like WIDS to To effectively
the wireless landscape for any anomalous patterns oversee and assess.wireless network traffic for
indicative of someone attempting to disrupt the
malicious activity, thus enhancing network
network by forcibly disconnecting connected devices.
This abstracts the complexity of network monitoring visibility, security, and compliance.
into a succinct and effective solution for detecting and ESP8266-based Security Solutions: Previous studies
mitigating de-authentication attacks. have explored the application of ESP8266 MCU in
enhancing networks. These works underscore the
versatility of ESP8266 in implementing intrusion
Keywords— ESP8266, de-authentication attacks, Wi- Identifying and stopping undesired occurrences,
Fi networks, Microcontroller unit (MCU),Espressif
making it an attractive option for addressing security
Systems, Wireless environment, Abnormal patterns,
concerns in various applications.
De-authentication packets, Threat detection.
De-authentication Attack Mitigation Techniques:
This section discusses de-authentication attacks,
1. INTRODUCTION their simplicity of execution, and potential
Detecting de-authentication attacks using ESP8266 disruptions, especially in public Wi-Fi
involves monitoring and analyzing wireless environments. It suggests mitigation techniques
communication disruptions within a network. The such as using strong encryption (WPA2/WPA3) and
ESP8266, a versatile Wi-Fi module, can be implementing network segmentation to limit
employed to identify anomalies associated with de- attacks.
authentication attacks. These attacks involve 3 .OBJECTIVE:
maliciously disconnecting devices from a Wi-Fi This study is to develop a robust Intrusion Detection
network, causing disruptions and potential security System (IDS) utilizing the ESP8266 microcontroller
threats. unit (MCU) to detect and mitigate de-authentication
By leveraging the ESP8266's capabilities, one can attacks in Wi-Fi networks. These attacks,
implement a monitoring system that constantly characterized by the transmission of fake de-
analyzes network traffic patterns. De-authentication authentication packets, pose a significant security
attacks often manifest as a sudden spike in threat by disrupting legitimate users' connections.
IJERTV13IS030105
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
International Journal of Engineering Research & Technology (IJERT)
Published by :
http://www.ijert.org ISSN: 2278-0181
Volume 13, Issue 03 March 2024
The intended goal of the system is to proactively de-authentication packets, by entering promiscuous
identify abnormal patterns in de-authentication mode.
packet activity through continuous Wi-Fi scanning
and real-time analysis. By leveraging the ESP8266's Channel Selection: Set ESP8266 to scan different
capabilities for packet sniffing and processing, the Wi-Fi channels and implement channel hopping
system will promptly raise alerts upon detection of functionality for comprehensive coverage.
potential attacks, symbolized by a "blue flag." Signal Strength Thresholds: Define signal strength
Additionally, the system will feature error handling thresholds to filter out weaker signals and focus on
mechanisms, logging, and reporting functionalities potential threats with stronger signals.
to ensure robust performance and comprehensive
analysis of detected events. Through Real-time Packet Analysis: Develop algorithms for
experimentation and testing in controlled real-time analysis of captured de-authentication
environments, the effectiveness of the ESP8266- packets, establishing criteria to identify abnormal
based IDS identifying and addressing de- patterns.
authentication attacks will be evaluated, paving the
way for enhanced security in Wi-Fi networks. Alert System Implementation: Implement a
signaling system (e.g., LED indicator or
notification) to raise alerts upon detection of
4 . SYSTEM REQUIREMENTS:
abnormal de-authentication patterns.
Continuous Wi-Fi scanning capability using
ESP8266 MCU. Attack Simulation: Test the setup in a controlled
Real-time analysis of de-authentication packets for environment by simulating de-authentication attacks
abnormal patterns detection. and evaluating the ESP8266's identifying and
Putting into practice a signalling system (e.g., "blue reacting capabilities.
flag" alert) to notify potential de-authentication
attacks. Logging and Reporting: Implement logging
Error handling mechanisms to ensure robust system mechanisms to record detected events and create a
performance. reporting system for detailed analysis, including
Logging and reporting functionalities for recording timestamps and signal strength information.
detected events and detailed analysis.
Error Handling: Incorporate robust error-handling
Compatibility with Arduino IDE or Platform IO for
mechanisms to ensure stability in diverse network
programming.
conditions.
Integration with ESP8266 Wi-Fi library for Wi-Fi
functionalities. Deployment Considerations: Strategically deploy
ESP8266 within the target network, considering
5. PROBLEM DEFINITION:. coverage, interference, and accessibility factors.
This paper addresses the challenge of effectively
detecting and mitigating de-authentication attacks in
Wi-Fi networks. These attacks involve sending fake 7. WORKFLOW:
de-authentication packets, which can disrupt 1 Start of Process: This is the starting point of the
legitimate user connections, posing security risks workflow.
and causing network downtime. Current solutions
may not promptly detect such attacks or may not be 2 Initialization: for monitoring the network traffic
optimized for wireless environments. Therefore, initialize the ESP8266 module.
there is a demand for an innovative approach that
utilizes the ESP8266 MCU's capabilities to develop 3. Monitoring : After configuring the Esp module
a specialized Intrusion Detection System (IDS) monitoring network traffic .
tailored for mitigating de-authentication attacks.
4 Detection: detecting the potential threats & de-
6. METHODOLOGY authentication packet’s with in the network traffic.
ESP8266 Configuration: Configure the ESP8266
5.Countermeasures: Taking the counter measures
MCU for effective network monitoring, including
Wi-Fi setup, packet sniffing capabilities, and real- 6 End of Process: This is the endpoint of the
time analysis algorithms implementation. workflow.
Wi-Fi Network Setup: Connect ESP8266 to the
target Wi-Fi network and program it using Arduino
IDE or PlatformIO.
Packet Sniffing Configuration: Configure ESP8266
to capture Wi-Fi packets, particularly focusing on
IJERTV13IS030105
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
International Journal of Engineering Research & Technology (IJERT)
Published by :
http://www.ijert.org ISSN: 2278-0181
Volume 13, Issue 03 March 2024
8. CONCLUSION:
IDS offers a robust and efficient solution for
identifying and reducing Wi-Fi de-authentication
attacks. Here are the key takeaways:
Response Time: Analysis of response times revealed
the system's swift reaction to de-authentication
attacks, with alerts triggered promptly upon
surpassing predefined thresholds. The rapid
response time ensures timely mitigation measures,
preventing prolonged disruptions to network
connectivity.
Signal Strength Analysis: Evaluation of signal
strength during de-authentication attacks showcased
the ESP8266's proficiency in focusing on potent
threats. The system effectively filtered out weaker
signals, enhancing its ability for detecting and
responding to attacks with higher signal strengths.
9. RESULTS:
In this section, we present the outcomes of our
project implementation and engage in a discussion
about its implications.
IJERTV13IS030105
(This work is licensed under a Creative Commons Attribution 4.0 International License.)
International Journal of Engineering Research & Technology (IJERT)
Published by :
http://www.ijert.org ISSN: 2278-0181
Volume 13, Issue 03 March 2024
10. REFERENCES:
[1] Hacking Techniques in Wireless Networks: Forged de-
authentication
[2] Joshua Wright (2005), Weaknesses in Wireless LAN Session
Containment (PDF)
[3] E. Oriwoh and G. Williams, “Internet of Things: The
argument for smart forensics,” in Handbook of research on
digital crime, cyberspace security, and information assu [6]
S. Yang, P. Luo, C. C. Loy, and X. Tang, “From facial parts
responses to face detection: A deep learning approach,” in
IEEE International Conference on Computer Vision, 2015,
pp. 3676-3684
[4] P. Thornycroft. (2016) Wi-Fi access to the Internet of Things
can be complicated. [Online].
[5] M. Bogdanoski, P. Latkoski, and A. Risteski, “Analysis of
the impact of AuthRF and AssRF attacks on IEEE 802.11e-
based access point,” Mobile Networks and Applications, vol.
22, no. 5, pp. 834–843, 2017.
[5] M. Bogdanoski, P. Latkoski, and A. Risteski, “Analysis of
the impact of AuthRF and AssRF attacks on IEEE 802.11e-
based access point,” Mobile Networks and Applications, vol.
22, no. 5, pp. 834–843, 2017.
[6] M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah,
“Security issues in the Internet of things (IoT): A
comprehensive study,” International Journal of Advanced
Computer Science and Applications (IJACSA), vol. 8, no. 6,
pp. 383, 2017.
[7] C. Liu and J. Qiu, “Performance study of 802.11w for
preventing DoS attacks on wireless local area networks,”
Wireless Personal Communications, vol. 95, no. 2, pp. 1031–
1053, 2017.
[8] J. Milliken, V. Selis, K. M. Yap, and A. Marshall, “Impact of
metric selection on wireless de-authentication DoS attack
performance,” IEEE Wireless Communications Letters, vol.
2, no. 5, pp. 571 574, 2013.
[8] J. Milliken, V. Selis, K. M. Yap, and A. Marshall, “Impact of
metric selection on wireless de-authentication DoS attack
[9] A. Efe, E. Aks¨ oz, N. Hanecio˘ glu, and S ¸. N.Yalman,
“Smart security of IoT against DDOS attacks,” International
Journal of Innovative Engineering Applications, vol. 2, no. 2,
pp. 35–43,2018.
[10] T. Khalil, “IoT security against DDoS attacks using machine
learning algorithms,” International Journal of Scientific and
Research Publications, vol. 7, no. 6, pp. 739–741, 2017.
[11] M. Alamanni, Kali Linux wireless penetration testing
essentials. UK: Packt Publishing, 2015.
[12] Course Technology Cengage Learning, Penetration testing
procedures & methodologies. USA: Nelson Education, Ltd.,
2011.
[13] H. Ikasamo. (2018) ESP8266/ESP32 connect
WI-FI made easy. [Online]. Avail able:
https://www.hackster.io/hieromonikasamo/
esp8266-esp32-connect-WI-FI-made-easy-
d75f45
IJERTV13IS030105
(This work is licensed under a Creative Commons Attribution 4.0 International License.)