使用端到端安全来防止邪恶的双重访问点

E. Chen, Mitsutaka Ito
{"title":"使用端到端安全来防止邪恶的双重访问点","authors":"E. Chen, Mitsutaka Ito","doi":"10.1109/WOWMOM.2009.5282395","DOIUrl":null,"url":null,"abstract":"The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call “end-to-middle security,” which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.","PeriodicalId":155486,"journal":{"name":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Using end-to-middle security to protect against evil twin access points\",\"authors\":\"E. Chen, Mitsutaka Ito\",\"doi\":\"10.1109/WOWMOM.2009.5282395\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call “end-to-middle security,” which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.\",\"PeriodicalId\":155486,\"journal\":{\"name\":\"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOWMOM.2009.5282395\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOWMOM.2009.5282395","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

“邪恶孪生”一词指的是一种看似合法的流氓无线接入点,但其设置目的是拦截移动用户和互联网之间的流量。本文将一种已知的技术概括为一种我们称之为“端到端安全”的模型,移动用户可以采用这种模型来抵御“邪恶孪生”攻击。该模型涉及到使用虚拟网关为移动用户安全中继流量。我们将这个模型形式化的目的是为了更广泛地认识到它的有效性,并鼓励更多针对游戏控制台和VoIP电话等可编程性较差的移动设备的解决方案实现。我们还派生出一组最小的需求来验证实现的正确性。最后,本文还提出了减少由于采用该模型而可能造成的交通传输延迟的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Using end-to-middle security to protect against evil twin access points
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call “end-to-middle security,” which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信