期刊文献+

Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1

Security Analysis of Application Layer Protocols on Wireless Local Area Networks
原文传递
导出
摘要 This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy.
作者 杨明豪
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页 上海交通大学学报(英文版)
基金 the National Science Council (No. NSC-99-2219-E-033-001) the Foundation of the Chung Yuan Christian University (1004) (No. CYCU-EECS.9801)
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN) man-in-the-middle (MITM) attacks, session hijacking, wireless local area network (WLAN)
  • 相关文献

参考文献18

  • 1Nessus. Tenable passive vulnerability scanner [EB/OL]. (2011-2-9). http://www.nessus.org/pro- ducts/tenable-passive-vulnerability-scanner.
  • 2GORDEN A L, LOEB P M, LUCYSHYN M, et al. Com- puter crime and security survey JR]. USA: CSI/FBI, 2006.
  • 3NIST SP800-48, Wireless network security: 802.11, bluetooth, and handheld devices IS].
  • 4GAO. Information security: Federal agencies need to improve controls over wireless networks [R]. USA: Gov- ernment Accountability Office, 2005.
  • 5SHIEH Shiuh-pyng. Security and privacy on wireless networks [J1. Science Monthly, 2005, 36(2): 444-447.
  • 6WALKER J. 802.11, security series part III: AES- based encapsulations of 802.11 data [EB/OL]. (2011- 2-27). http://jcbserver.uwaterloo.ca/cs436/nandouts/ miscellaneous/Intel Wireless 3.pdf.
  • 7CAM-WINGET C, HOUSLEY R, WAGNER D, et al. Se- curity flaws in 802.11 data link protocols [J]. Commu- nications of the ACM, 2003, 46(5): 35-39.
  • 8BAEK K H, SMITH S W, KOTZ D. A survey of WPA and 802.11i RSN authentication protocols [R]. USA: Dartmouth College Computer Science, 2004.
  • 9CHOU Hung-Lin. Analysis of WPA security [EB/OL]. (2011-3-5). http://lee- 1.com/hlchou/WLANWPA. html.
  • 10Wi-Fi Alliance. Wi-Fi is everywhere [EB/OL]. (2011- 4-10). http://www.wifialliance.org/OpenSection/pdf/ WPA_NI_2003-Pres.pdf.

同被引文献9

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部