• DocumentCode
    2209668
  • Title

    Countering rogues in wireless networks

  • Author

    Godber, Austin ; Dasgupta, Partha

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA
  • fYear
    2003
  • fDate
    6-9 Oct. 2003
  • Firstpage
    425
  • Lastpage
    431
  • Abstract
    Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.
  • Keywords
    Internet; data privacy; radio access networks; telecommunication security; VPN tunnel; Web surfing; man-in-the-middle attacks; ramifications; rogues; sniffing; spoofing; trusted host; wireless networks; wireless security problem; Computer science; Cryptography; Explosives; Home computing; Intelligent networks; Switches; Telecommunication traffic; Virtual private networks; Wireless networks; Wiring;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on
  • ISSN
    1530-2016
  • Print_ISBN
    0-7695-2018-9
  • Type

    conf

  • DOI
    10.1109/ICPPW.2003.1240398
  • Filename
    1240398