Security Analysis of Application Layer Protocols on Wireless Local Area Networks

被引:0
|
作者
杨明豪 [1 ]
机构
[1] Department of Information & Computer Engineering, Chung Yuan Christian University
关键词
man-in-the-middle (MITM) attacks; session hijacking; wireless local area network (WLAN);
D O I
暂无
中图分类号
TN925.93 [];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ;
摘要
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users’ connection, the connection managers will automatically research the last access point’s extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users’ access points, they can pass AL’s authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users’ account details, passwords, data and privacy.
引用
收藏
页码:586 / 592
页数:7
相关论文
共 50 条
  • [41] Transport protocols in local area networks
    Holler, E.
    [J]. IT - Information Technology, 1987, 29 (06): : 379 - 385
  • [42] SECURITY AND LOCAL AREA NETWORKS
    ORTIZ, J
    [J]. INFORMATION AGE, 1986, 8 (01): : 48 - 53
  • [43] The Security of Wireless Local Area Network
    NAN Lin
    [J]. 电脑知识与技术, 2007, (09) : 634 - 635
  • [44] Wireless Local Area Networks
    Marincic, A
    Milovanovic, D
    [J]. TELSIKS '99: 4TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES, PROCEEDINGS, VOLS 1 AND 2, 1999, : 291 - 299
  • [45] Bioinspired Security Analysis of Wireless Protocols
    Petrocchi, Marinella
    Spognardi, Angelo
    Santi, Paolo
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
  • [46] Bioinspired Security Analysis of Wireless Protocols
    Marinella Petrocchi
    Angelo Spognardi
    Paolo Santi
    [J]. Mobile Networks and Applications, 2016, 21 : 139 - 148
  • [47] Application layer protocol for IoT using Wireless Sensor Networks communication protocols
    Stangaciu, Valentin
    Stanciu, Madalina
    Lupu, Loredana
    Micea, Mihai V.
    Cretu, Vladimir
    [J]. 2017 9TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2017, : 425 - 430
  • [48] Data Link Layer' Security Analysis for Wireless Sensor Networks
    Bruce, Ndibanje
    Kim, Tae-Yong
    Lee, Hoon Jae
    [J]. COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS, 2012, 350 : 25 - +
  • [49] Adaptive Transport Layer Protocols for Wireless Networks
    Wang, Lian
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 50 - 55
  • [50] Design of MAC protocols with less collision fast resolution for wireless local area networks
    Yan, Y
    Park, D
    [J]. 2005 IEEE 6TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, 2005, : 1 - 6