Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Countering rogues in wireless networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
Godber, A. ; Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA ; Dasgupta, P.

Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and man-in-the-middle attacks (MITM). In this paper we show how wireless networks are particularly vulnerable to a simple MITM that can make even rudimentary Web surfing dangerous. We describe how we performed the attack and its ramifications. We argue why it is essential to have a VPN tunnel from the client to some trusted host (not access point) in order to avoid being compromised.

Published in:

Parallel Processing Workshops, 2003. Proceedings. 2003 International Conference on

Date of Conference:

6-9 Oct. 2003