Security Analysis of Application Layer Protocols on Wireless Local Area Networks

被引:0
|
作者
杨明豪 [1 ]
机构
[1] Department of Information & Computer Engineering, Chung Yuan Christian University
关键词
man-in-the-middle (MITM) attacks; session hijacking; wireless local area network (WLAN);
D O I
暂无
中图分类号
TN925.93 [];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users’ connection, the connection managers will automatically research the last access point’s extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users’ access points, they can pass AL’s authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users’ account details, passwords, data and privacy.
引用
收藏
页码:586 / 592
页数:7
相关论文
共 50 条
  • [21] Security Protocols for Wireless Sensor Networks
    Bhalla, Monika
    Pandey, Nitin
    Kumar, Brijesh
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1005 - 1009
  • [22] Throughput Analysis and Optimization of Distributed Collision Detection Protocols in Dense Wireless Local Area Networks
    Choi, Hyun-Ho
    Lee, Howon
    Kim, Sanghoon
    Lee, In-Ho
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 502 - 512
  • [23] Selection application for platforms and security protocols suitable for wireless sensor networks
    Moeller, S.
    Newe, T.
    Lochmann, S.
    [J]. SENSORS & THEIR APPLICATIONS XV, 2009, 178
  • [24] APPLICATION OF BEAMFORMING IN WIRELESS LOCAL AREA COMPUTER NETWORKS
    Yordanov, Vladislav
    Iliev, Georgi
    Poulkov, Vladimir
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 3 - 16
  • [25] CogMAC: a cognitive link layer for wireless local area networks
    de Oliveira Filho, Jorge Lima
    Kliazovich, Dzmitry
    Granelli, Fabrizio
    Madeira, Edmundo
    da Fonseca, Nelson L. S.
    [J]. WIRELESS NETWORKS, 2013, 19 (06) : 1337 - 1347
  • [26] CogMAC: a cognitive link layer for wireless local area networks
    Jorge Lima de Oliveira Filho
    Dzmitry Kliazovich
    Fabrizio Granelli
    Edmundo Madeira
    Nelson L. S. da Fonseca
    [J]. Wireless Networks, 2013, 19 : 1337 - 1347
  • [27] Cross-layer throughput analysis with capture effect in wireless local area networks
    Ge, Xiaohu
    Yang, Yang
    Chen, Hsiao-Hwa
    Zhu, Yaoting
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 4164 - +
  • [28] Wireless AMI Application and Security for Controlled Home Area Networks
    Aravinthan, Visvakumar
    Namboodiri, Vinod
    Sunku, Samshodh
    Jewell, Ward
    [J]. 2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [29] Performance Analysis of Cross Layer Protocols for Wireless Sensor Networks
    Gajjar, Sachin
    Pradhan, Shrikant N.
    Dasgupta, Kankar
    [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 348 - 354
  • [30] Improved channel-aware MAC protocols for wireless local area networks
    Chen, ZH
    Khokhar, A
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2005, 5 (03): : 319 - 327