上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (5): 586-592.doi: 10.1007/s12204-011-1193-5

• 论文 • 上一篇    下一篇

Security Analysis of Application Layer Protocols on Wireless Local Area
Networks

 YANG Ming-hour (杨明豪)   

  1. (Department of Information & Computer Engineering,
    Chung Yuan Christian University, Chung Li 320)
  • 收稿日期:2011-06-12 出版日期:2011-10-29 发布日期:2011-10-20
  • 通讯作者: YANG Ming-hour (杨明豪) E-mail: mhyang@cycu.edu.tw

Security Analysis of Application Layer Protocols on Wireless Local Area
Networks

 YANG Ming-hour (杨明豪)   

  1. (Department of Information & Computer Engineering,
    Chung Yuan Christian University, Chung Li 320)
  • Received:2011-06-12 Online:2011-10-29 Published:2011-10-20
  • Contact: YANG Ming-hour (杨明豪) E-mail: mhyang@cycu.edu.tw

摘要: Abstract:  This paper aims at analyzing the security issues that lie in the
application layer (AL) protocols when users connect to the Internet via a
wireless local area network (WLAN) through an access point. When adversaries
launch deauthentication flood attacks cutting users' connection,
the connection managers will automatically re-search the last access point's
extended service set identifier (ESSID) and then re-establish connection.
However, such re-connection can lead the users to a fake access point with
the same ESSID set by attackers. As the attackers hide behind users' access
points, they can pass AL's authentication and security schemes, e.g. secure
socket layer (SSL). We have proved that they can even spy on users' account
details, passwords, data and privacy.

关键词: man-in-the-middle (MITM) attacks, session hijacking, wireless
local area network (WLAN)

Abstract: Abstract:  This paper aims at analyzing the security issues that lie in the
application layer (AL) protocols when users connect to the Internet via a
wireless local area network (WLAN) through an access point. When adversaries
launch deauthentication flood attacks cutting users' connection,
the connection managers will automatically re-search the last access point's
extended service set identifier (ESSID) and then re-establish connection.
However, such re-connection can lead the users to a fake access point with
the same ESSID set by attackers. As the attackers hide behind users' access
points, they can pass AL's authentication and security schemes, e.g. secure
socket layer (SSL). We have proved that they can even spy on users' account
details, passwords, data and privacy.

Key words: man-in-the-middle (MITM) attacks, session hijacking, wireless
local area network (WLAN)

中图分类号: