Abstract

With the rapid development of public service of wireless network, the quantities of free Access Points (APs) in open system authentication increase explosively. However, the security problems also raise prominent, especially, personal privacy disclosure brought by fake APs. We analyze the attack behaviors of the intruders. It is proved that open free AP can be attacked successfully by fake AP, compromised AP and spider AP. One type of fake AP attack (a software of airhack is developed) has been implemented to attack auto-reconnect method of legal AP and launched in real environment effectively. In order to ensure secure and trusted access, a new access method for AP in open system authentication is analyzed and improved to defense spider AP. This method is verified by the real typical instance of airhack.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.