Skip to main content

A Study on the Defense MITM with Message Authentication in WLAN Environments

  • Conference paper
  • First Online:
Book cover Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

  • 1803 Accesses

Abstract

Recently smartphone users is growing and AP are installed in public places while increasing. But AP’s have been shared without the most secure in public areas. In addition, a free smartphone application that uses the Internet are being developed to communicate with the server without a page advertising the security process. In this environment, Attacker can obtain the personal information of the number of users of the user and the AP interrupt and a MITM attack, connect to a shared AP. In this paper, we try a MITM attack against the real application report and the result is analyzed. In addition, the application corresponding to the MITM attack in unreliable AP Environment - offers a secure communication between the server and the model evaluation by applying them to the attack scenario.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wireless Geographic Logging Engine. https://wigle.net

  2. Android Open Source Project. http://source.android.com

  3. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. PEARSON (2011)

    Google Scholar 

  4. Preneel, B., Van Oorschot, P.C.: MDx-MAC and building fast MACs from hash functions. In: Cryptology CRYPT0 1995. Springer, Heidelberg (1995)

    Google Scholar 

  5. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Cryptology CRYPTO 1996. Springer, Heidelberg (1996)

    Google Scholar 

  6. Arbaugh, W.A.: Your 80211 wireless network has no clothes. IEEE Wireless Communications 9(6) (2002)

    Google Scholar 

  7. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: The HMAC construction. RSA Laboratories’ CryptoBytes (1996)

    Google Scholar 

  8. Prasithsangaree. P., Krishnamurthy, P.: A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. Vehicular Technology Conference (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ji-Hoon Hong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Hong, JH., Kim, NU., Chung, TM. (2015). A Study on the Defense MITM with Message Authentication in WLAN Environments. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics