DocumentCode
2209668
Title
Countering rogues in wireless networks
Author
Godber, Austin ; Dasgupta, Partha
Author_Institution
Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
fYear
2003
fDate
6-9 Oct. 2003
Firstpage
425
Lastpage
431
Abstract
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.
Keywords
Internet; data privacy; radio access networks; telecommunication security; VPN tunnel; Web surfing; man-in-the-middle attacks; ramifications; rogues; sniffing; spoofing; trusted host; wireless networks; wireless security problem; Computer science; Cryptography; Explosives; Home computing; Intelligent networks; Switches; Telecommunication traffic; Virtual private networks; Wireless networks; Wiring;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
ISSN
1530-2016
Print_ISBN
0-7695-2018-9
Type
conf
DOI
10.1109/ICPPW.2003.1240398
Filename
1240398
Link To Document