Secure and Efficient Communication Method in Rogue Access Point Environments

نویسندگان

  • Bumjoo Park
  • Namgi Kim
چکیده

WiFi networks, which have been widely used along with the explosive increases in the supply of smartphones, can provide high network speeds but cannot prevent user information spills though rogue Access Points (APs). Therefore, the present paper proposes a method to exchange SSL session keys through more secure 3G networks to be used in WiFi networks in order to prevent such spills. In the proposed method, only those session keys to be used in SSLs are exchanged through 3G networks, and the remaining application data is transferred through WiFi networks. Therefore, attacks by rogue APs can be prevented with sufficient use of the speedy and efficient WiFi networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending against Malicious Rogue System Threats

by Chad D. Mano With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This dissertation addresses the rogue system problem, a significant threat in modern networks. A rogue system is a device installed within a network witho...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

A Review of Online Rogue Access Point Detection

A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-themiddle attack. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collec...

متن کامل

Using Secure Coprocessors to Protect Access to Enterprise Networks

Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters’ computers, or by attackers exploiting rogue access points or modems. Techniques that prevent connection to enterprise networks of nodes whose configuration does not conform to enterprise policies could greatly reduce such vulnerabilities. Network Admission Control (NAC) and ...

متن کامل

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013