Skip to main content

Unintended Certificate Installation into Remote IoT Nodes

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 994))

  • 1381 Accesses

Abstract

Public Wi-Fi is a service provided for anyone to use at public places such as community centers, welfare facilities and traditional markets in cooperation with telecommunication service provider of South Korea such as KT, SKT and LGU+. The government is building and expanding public Wi-Fi zones in a bid to reduce the telecommunication cost of all people and ease the gap in the wireless internet use by region and income. It aimed to establish 12,000 public Wi-Fi zones in and around welfare facilities and traditional markets by 2017 (7000 new ones and 5000 open to public by the telecommunication service providers). The public Wi-Fi policy made it possible for people to use it for free at most of those places and eventually reduce their telecommunication cost. However, the service is vulnerable to various security threats. The study reviewed ways to reduce possible infringement of users’ personal information and vulnerability by simulating and examining scenarios under which the vulnerability can take place. Threats arising from the vulnerability may lead to infringement of personal information and sensitive information as well as additional attacks through unauthorized communication channels. Therefore, the study introduced problems attributable to the process of connecting to public Wi-Fi and investigated types of attack that can happen in the process and ways to address them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.msit.go.kr/web/msipContents/contentsView.do?cateId=mssw311&artId=136267

  2. http://wififree.kr/ko/service/service_info_02.jsp

  3. IEEE. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11 (2012)

    Google Scholar 

  4. http://www.ktword.co.kr/abbr_view.php?nav=&m_temp1=2319&mgid=148

  5. Sidiropoulos, N., et al.: Open Wifi SSID Broadcast vulnerability, SSN Project Assessment (2012)

    Google Scholar 

  6. Ong, I.: WiFi optimizations to improve SSID priority to enhance overall quality of experience. In: 2016 Spring Technical Forum Proceedings

    Google Scholar 

  7. https://www.wi-fi.org/ko/news-events/newsroom/wi-fi-certified-passpoint

  8. https://www.arubanetworks.com/assets/wp/WP_Passpoint_Wi-Fi.pdf

  9. Eilam, E.: REVERSING: Secrets of Reverse Engineering. Amazon Digital Services LLC

    Google Scholar 

  10. Beyah, R., et al.: Rogue access point detection using temporal traffic characteristics, pp. 2271–2275, vol. 4, IEEE Global Telecommunications Conference (2004)

    Google Scholar 

  11. Ornaghi, A., et al.: Man in the middle attacks. Blackhat Conference–Europe (2003)

    Google Scholar 

  12. Bharti, A.K., et al.: A review on detection of session Hijacking and Ip spoofing, vol. 4, no. 9 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Park, J., Son, B., Park, J., Kim, M., Yim, K. (2020). Unintended Certificate Installation into Remote IoT Nodes. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_81

Download citation

Publish with us

Policies and ethics