{"title":"Research and Prevention of Rogue AP Based MitM in Wireless Network","authors":"Mengru Cai, Zhendong Wu, Jianwu Zhang","doi":"10.1109/3PGCIC.2014.105","DOIUrl":null,"url":null,"abstract":"Due to the wireless network is popularly used, the security of wireless network is more important than past. Wireless network is considerably more susceptible to MitM (man-in-the-middle) attack. This paper proposes a Rogue AP based MitM attack framework. In actual wireless network, the mobile terminals cannot properly validate the server due to their limitation. The attackers force the user to connect the Rogue AP so as to obtain the authentication credentials of the unauthorized users. Then the attackers use these credentials to connect to the legitimate AP. We test this MitM framework in the actual wireless network environment under the EAP-TTLS/MSCHAPv2 using different mobile terminals. Last we propose a two-factor based dynamic password technology to prevent this MitM attack.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3PGCIC.2014.105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Due to the wireless network is popularly used, the security of wireless network is more important than past. Wireless network is considerably more susceptible to MitM (man-in-the-middle) attack. This paper proposes a Rogue AP based MitM attack framework. In actual wireless network, the mobile terminals cannot properly validate the server due to their limitation. The attackers force the user to connect the Rogue AP so as to obtain the authentication credentials of the unauthorized users. Then the attackers use these credentials to connect to the legitimate AP. We test this MitM framework in the actual wireless network environment under the EAP-TTLS/MSCHAPv2 using different mobile terminals. Last we propose a two-factor based dynamic password technology to prevent this MitM attack.