Abstract
Recently smartphone users is growing and AP are installed in public places while increasing. But AP’s have been shared without the most secure in public areas. In addition, a free smartphone application that uses the Internet are being developed to communicate with the server without a page advertising the security process. In this environment, Attacker can obtain the personal information of the number of users of the user and the AP interrupt and a MITM attack, connect to a shared AP. In this paper, we try a MITM attack against the real application report and the result is analyzed. In addition, the application corresponding to the MITM attack in unreliable AP Environment - offers a secure communication between the server and the model evaluation by applying them to the attack scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wireless Geographic Logging Engine. https://wigle.net
Android Open Source Project. http://source.android.com
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. PEARSON (2011)
Preneel, B., Van Oorschot, P.C.: MDx-MAC and building fast MACs from hash functions. In: Cryptology CRYPT0 1995. Springer, Heidelberg (1995)
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Cryptology CRYPTO 1996. Springer, Heidelberg (1996)
Arbaugh, W.A.: Your 80211 wireless network has no clothes. IEEE Wireless Communications 9(6) (2002)
Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: The HMAC construction. RSA Laboratories’ CryptoBytes (1996)
Prasithsangaree. P., Krishnamurthy, P.: A new authentication mechanism for loosely coupled 3G-WLAN integrated networks. Vehicular Technology Conference (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Hong, JH., Kim, NU., Chung, TM. (2015). A Study on the Defense MITM with Message Authentication in WLAN Environments. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_49
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_49
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)