Countering rogues in wireless networks

A. Godber, Partha Dasgupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.

Original languageEnglish (US)
Title of host publicationProceedings - 2003 International Conference on Parallel Processing Workshops, ICPPW 2003
EditorsChua-Huang Huang, J. Ramanujam
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages425-431
Number of pages7
ISBN (Electronic)0769520189
DOIs
StatePublished - 2003
Event2003 International Conference on Parallel Processing Workshops, ICPPW 2003 - Kaohsiung, Taiwan, Province of China
Duration: Oct 6 2003Oct 9 2003

Publication series

NameProceedings of the International Conference on Parallel Processing Workshops
Volume2003-January
ISSN (Print)1530-2016

Other

Other2003 International Conference on Parallel Processing Workshops, ICPPW 2003
Country/TerritoryTaiwan, Province of China
CityKaohsiung
Period10/6/0310/9/03

Keywords

  • Computer science
  • Cryptography
  • Explosives
  • Home computing
  • Intelligent networks
  • Switches
  • Telecommunication traffic
  • Virtual private networks
  • Wireless networks
  • Wiring

ASJC Scopus subject areas

  • Software
  • General Mathematics
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Countering rogues in wireless networks'. Together they form a unique fingerprint.

Cite this