Security Analysis of Application Layer Protocols on Wireless Local Area Networks

被引:0
|
作者
杨明豪 [1 ]
机构
[1] Department of Information & Computer Engineering, Chung Yuan Christian University
关键词
man-in-the-middle (MITM) attacks; session hijacking; wireless local area network (WLAN);
D O I
暂无
中图分类号
TN925.93 [];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users’ connection, the connection managers will automatically research the last access point’s extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users’ access points, they can pass AL’s authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users’ account details, passwords, data and privacy.
引用
收藏
页码:586 / 592
页数:7
相关论文
共 50 条
  • [1] Security analysis of application layer protocols on wireless local area networks
    Yang M.-H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 586 - 592
  • [2] Measuring Performance Impact of Security Protocols in Wireless Local Area Networks
    Agarwal, Avesh K.
    Wang, Wenye
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 625 - +
  • [3] Security system for wireless local area networks
    Korba, L
    [J]. NINTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-3, 1998, : 1550 - 1554
  • [4] Quantitative analysis of security protocols in wireless networks
    Best, P
    Namuduri, K
    Pendse, R
    [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
  • [5] IoT Networks: Security Vulnerabilities of Application Layer Protocols
    Lalit, Mohit
    Chawla, Sunil Kumar
    Rana, Arun Kumar
    Nisar, Kashif
    Soomro, Tariq Rahim
    Khan, Muhammad Asghar
    [J]. 2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [6] On Physical Layer Security in Finite-Area Wireless Networks: An Analysis Framework
    Liu, Jiajia
    Dai, Jiahao
    Shi, Yongpeng
    Sun, Wen
    Kato, Nei
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [7] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    [J]. CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97
  • [8] A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN)
    Kang, James
    Adibi, Sasan
    [J]. FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 61 - 83
  • [9] Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey
    AlMheiri, Saleha Mubarak
    AlQamzi, Hend Saeed
    [J]. 2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 312 - 317
  • [10] MAC LAYER SECURITY MEASURES IN LOCAL AREA NETWORKS
    WILBUR, SR
    CROWCROFT, J
    MURAYAMA, Y
    [J]. LOCAL AREA NETWORK SECURITY, 1989, 396 : 53 - 65