Title :
Modeling of Man-in-the-Middle Attack in the Wireless Networks
Author :
Chen, Zhe ; Guo, Shize ; Zheng, Kangfeng ; Yang, Yixian
Author_Institution :
Sch. of Inf. Eng., Beijing Univ. of Posts & Telecommun., Beijing
Abstract :
As the number of wireless users increases and as more powerful mobile devices become available for lower cost, Man-in- the-Middle attacks will pose an increasingly real threat to wireless network security. In this paper, a unified mathematical model is established to analyze Man-in-the-Middle attacks in diverse wireless networks. Then we use propositions and logical operations to analyze the relationships of the elements in the model formally. The model and the logical reasoning used in it can assess whether a given system is vulnerable to this type of attack. The defense model of removing the vulnerability is also presented.
Keywords :
cellular radio; mobile radio; telecommunication security; GSM; logical reasoning; man in the middle attack; unified mathematical model; wireless networks; Authentication; Communication system security; Costs; Data security; GSM; Mobile communication; Power system security; Protocols; Telecommunication traffic; Wireless networks;
Conference_Titel :
Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-1311-9
DOI :
10.1109/WICOM.2007.562