and trick the client to reinstall an already-in-use key.
In the detection stage, we monitor all the traffic go-
ing through the SDN network and check for the du-
plicated message 3 transmission to detect KRACK.
Finally, in the mitigation stage, the flow table was up-
dated to navigate the attack traffic to a splash portal.
The experiment was set up in a lab environment and
important time metrics were recorded for evaluating
the framework. Experimental results show that the de-
tection and mitigation scheme in the proposed frame-
work is very efficient to defend against KRACK.
In the future work, we will study the scalabil-
ity of the proposed framework. We will conduct the
experiments in a large scale real-world network. In
the meantime, we will try to attack multiple clients
by exploring different attacks within the umbrella of
KRACK and investigate machine learning schemes to
classify those attacks based on different attack types.
ACKNOWLEDGEMENT
We acknowledge NSF to partially sponsor the re-
search work under grants #1633978, #1620871,
#1636622, #1651280, #1620862, and #1620868, and
BBN/GPO project #1936 through an NSF/CNS grant.
REFERENCES
Akram, Z., Saeed, M. A., and Daud, M. (2018). Real
time exploitation of security mechanisms of residen-
tial WLAN access points. In IEEE iCoMET, pages
1–5.
Alblwi, S. and Shujaee, K. (2017). A survey on wireless se-
curity protocol wpa2. In Int. Conf. security and man-
agement, pages 12–17.
Cheminod, M., Durante, L., Seno, L., Valenza, F., Valen-
zano, A., and Zunino, C. (2017). Leveraging SDN
to improve security in industrial networks. In IEEE
WFCS, pages 1–7.
Chin, T. and Xiong, K. (2018). KrackCover: A wireless
security framework for covering KRACK attacks. In
WASA, pages 733–739.
Feh
´
er, D. J. and Sandor, B. (2018). Effects of the
WPA2 KRACK attack in real environment. In IEEE
SISY, pages 239–242.
Ghanem, M. C. and Ratnayake, D. N. (2016). En-
hancing WPA2-PSK four-way handshaking after re-
authentication to deal with de-authentication followed
by brute-force attack a novel re-authentication proto-
col. In IEEE CyberSA, pages 1–7.
Kumkar, V., Tiwari, A., Tiwari, P., Gupta, A., and Shrawne,
S. (2012). Vulnerabilities of wireless security proto-
cols (WEP and WPA2). IJARCET, 1(2):34–38.
Manzoor, S., Akber, S. M. A., Menhas, M. I., Imran, M.,
Sajid, M., Talal, H., and Samad, U. (2018). An
SDN enhanced load balancing mechanism for a multi-
controller wifi network. In IEEE ICPESG, pages 1–5.
Big Switch Networks ([Online]. Sept. 2018).
Project Floodlight. Available: http://www.project
floodlight.org/.
Naitik, S., Lobo, R., Vernekar, P. S., and Shetty, V. G. Miti-
gation of key reinstallation attack in WPA2 Wi-Fi net-
works by detection of nonce reuse. In IRJET, pages
1528–1531.
Noh, J., Kim, J., Kwon, G., and Cho, S. (2016). Secure key
exchange scheme for WPA/WPA2-PSK using public
key cryptography. In IEEE ICCE-Asia, pages 1–4.
Sam, S. ([Online]. 2019). KRACK detector. Available:
https://github.com/securingsam/krackdetector.
Scott-Hayward, S., O’Callaghan, G., and Sezer, S. (2013).
SDN security: A survey. In IEEE SDN4FNS, pages
1–7.
Shin, S., Xu, L., Hong, S., and Gu, G. (2016). Enhancing
network security through software defined networking
(SDN). In IEEE ICCCN, pages 1–9.
Terkawi, A. and Innab, N. (2018). Major impacts of key
reinstallation attack on Internet of things system. In
IEEE NCC, pages 1–6.
Teyou, C. C. T. and Zhang, P. (2018). Solving downgrade
and DoS attack due to the four ways handshake vul-
nerabilities (WIFI). IJEMR, 8(4):1–10.
Tsitroulis, A., Lampoudis, D., and Tsekleves, E. (2014a).
Exposing WPA2 security protocol vulnerabilities.
IJICS, 6(1):93–107.
Tsitroulis, A., Lampoudis, D., and Tsekleves, E.
(2014b). ExposingWPA2 security protocol vulnera-
bilities. IJICS, 6:93–107.
Vanhoef, M. and Piessens, F. (2017). Key reinstallation at-
tacks: Forcing nonce reuse in WPA2. In ACM CCS,
pages 1313–1328.
Securing Sam ([Online]. 2019). KRACK attacks white
paper. Available: https://www.securingsam.com/in
dex.php/2017/08/03/
krackattacks/.
Vanhoef, M. and Piessens, F. (2018). Release the Kraken:
New KRACKs in the 802.11 standard. In ACM CCS,
pages 299–314.
Xie, J., Yu, F. R., Huang, T., Xie, R., Liu, J., and Liu,
Y. (2018). A survey of machine learning techniques
applied to software defined networking (SDN): Re-
search issues and challenges. IEEE Communications
Surveys & Tutorials.
Yan, Q., Yu, F. R., Gong, Q., and Li, J. (2016). Software-
defined networking (SDN) and Distributed Denial of
Service (DDoS) attacks in cloud computing environ-
ments: A survey, some research issues, and chal-
lenges. IEEE Communications Surveys & Tutorials,
18:602–622.
Yang, Q. and Huang, L. (2018). Overview of wireless se-
curity, attack and defense. In Inside Radio: An Attack
and Defense Guide, pages 1–5.
A Software-defined Networking-based Detection and Mitigation Approach against KRACK
251