DocumentCode :
1728487
Title :
Using end-to-middle security to protect against evil twin access points
Author :
Chen, Eric Y. ; Ito, Mitsutaka
Author_Institution :
NTT Inf. Sharing Platform Labs., NTT Corp., Musashino, Japan
fYear :
2009
Firstpage :
1
Lastpage :
6
Abstract :
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call ldquoend-to-middle security,rdquo which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.
Keywords :
Internet; mobile radio; telecommunication security; telecommunication traffic; Internet; VoIP phones; end-to-middle security; evil twin attacks; game consoles; mobile users; traffic transmission; wireless access point; Communication system security; Cryptography; Delay; Indium tin oxide; Information security; Internet; Laboratories; Protection; Protective relaying; Traffic control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on a
Conference_Location :
Kos
Print_ISBN :
978-1-4244-4440-3
Electronic_ISBN :
978-1-4244-4439-7
Type :
conf
DOI :
10.1109/WOWMOM.2009.5282395
Filename :
5282395
Link To Document :
بازگشت