Abstract
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.
Original language | English (US) |
---|---|
Title of host publication | Proceedings of the International Conference on Parallel Processing Workshops |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 425-431 |
Number of pages | 7 |
Volume | 2003-January |
ISBN (Print) | 0769520189 |
DOIs | |
State | Published - 2003 |
Event | 2003 International Conference on Parallel Processing Workshops, ICPPW 2003 - Kaohsiung, Taiwan, Province of China Duration: Oct 6 2003 → Oct 9 2003 |
Other
Other | 2003 International Conference on Parallel Processing Workshops, ICPPW 2003 |
---|---|
Country | Taiwan, Province of China |
City | Kaohsiung |
Period | 10/6/03 → 10/9/03 |
Fingerprint
Keywords
- Computer science
- Cryptography
- Explosives
- Home computing
- Intelligent networks
- Switches
- Telecommunication traffic
- Virtual private networks
- Wireless networks
- Wiring
ASJC Scopus subject areas
- Software
- Mathematics(all)
- Hardware and Architecture
Cite this
Countering rogues in wireless networks. / Godber, A.; Dasgupta, Partha.
Proceedings of the International Conference on Parallel Processing Workshops. Vol. 2003-January Institute of Electrical and Electronics Engineers Inc., 2003. p. 425-431 1240398.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Countering rogues in wireless networks
AU - Godber, A.
AU - Dasgupta, Partha
PY - 2003
Y1 - 2003
N2 - Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.
AB - Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.
KW - Computer science
KW - Cryptography
KW - Explosives
KW - Home computing
KW - Intelligent networks
KW - Switches
KW - Telecommunication traffic
KW - Virtual private networks
KW - Wireless networks
KW - Wiring
UR - http://www.scopus.com/inward/record.url?scp=84904801273&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84904801273&partnerID=8YFLogxK
U2 - 10.1109/ICPPW.2003.1240398
DO - 10.1109/ICPPW.2003.1240398
M3 - Conference contribution
AN - SCOPUS:84904801273
SN - 0769520189
VL - 2003-January
SP - 425
EP - 431
BT - Proceedings of the International Conference on Parallel Processing Workshops
PB - Institute of Electrical and Electronics Engineers Inc.
ER -