K. Juhász, Valéria Póser, M. Kozlovszky, Anna Bánáti
{"title":"IEEE 802.11协议中SSID伪造导致WiFi漏洞","authors":"K. Juhász, Valéria Póser, M. Kozlovszky, Anna Bánáti","doi":"10.1109/SAMI.2019.8782775","DOIUrl":null,"url":null,"abstract":"One of the most widely used, widespread technology of our day is Wi-Fi, enabling our wireless devices to communicate with each other. Its popularity stems from the fact that it is available in more and more places and is easy to use. Most of the connection steps are automatically done in the background at the client device. Thus, the devices automatically save the data needed to reconnect (the SSID, and the password). So that, when a known network is re-deployed, connection can be totally automatic without any user intervention. However, such convenience feature also poses significant risks as the devices can easily connect and automatically trust the network of an attacker with forged SSID. The aim of our research was to explore, test, such vulnerability and demonstrate adequate security solution against it.","PeriodicalId":240256,"journal":{"name":"2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"WiFi vulnerability caused by SSID forgery in the IEEE 802.11 protocol\",\"authors\":\"K. Juhász, Valéria Póser, M. Kozlovszky, Anna Bánáti\",\"doi\":\"10.1109/SAMI.2019.8782775\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most widely used, widespread technology of our day is Wi-Fi, enabling our wireless devices to communicate with each other. Its popularity stems from the fact that it is available in more and more places and is easy to use. Most of the connection steps are automatically done in the background at the client device. Thus, the devices automatically save the data needed to reconnect (the SSID, and the password). So that, when a known network is re-deployed, connection can be totally automatic without any user intervention. However, such convenience feature also poses significant risks as the devices can easily connect and automatically trust the network of an attacker with forged SSID. The aim of our research was to explore, test, such vulnerability and demonstrate adequate security solution against it.\",\"PeriodicalId\":240256,\"journal\":{\"name\":\"2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAMI.2019.8782775\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAMI.2019.8782775","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
WiFi vulnerability caused by SSID forgery in the IEEE 802.11 protocol
One of the most widely used, widespread technology of our day is Wi-Fi, enabling our wireless devices to communicate with each other. Its popularity stems from the fact that it is available in more and more places and is easy to use. Most of the connection steps are automatically done in the background at the client device. Thus, the devices automatically save the data needed to reconnect (the SSID, and the password). So that, when a known network is re-deployed, connection can be totally automatic without any user intervention. However, such convenience feature also poses significant risks as the devices can easily connect and automatically trust the network of an attacker with forged SSID. The aim of our research was to explore, test, such vulnerability and demonstrate adequate security solution against it.