TY - GEN
T1 - A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP
AU - Hyunuk, Hwang
AU - Gyeok, Jung
AU - Kiwook, Sohn
AU - Sangseo, Park
PY - 2008
Y1 - 2008
N2 - The security of wireless LAN is being strengthened through a combination of EAP with an 802.1X-based authentication server, with 802.11i as the standard. As such a security technique effectively defends the existing WEP or protocol vulnerabilities, another approach is needed to prove the vulnerability of the wireless LAN. This paper proposes the wireless MITM (Man in the Middle) Framework, which can actively prove the vulnerability of MITM by applying the MITM technique in the wireless LAN environment, whose security is applied using 802.1X and EAP. It also describes the designing of the required functions and modules. This paper proposes that it is possible to collect the wireless LAN authentication information of the unauthorized user using the designed Wireless MITM-Framework under the EAP-MD5 and EAPTTLS environment.
AB - The security of wireless LAN is being strengthened through a combination of EAP with an 802.1X-based authentication server, with 802.11i as the standard. As such a security technique effectively defends the existing WEP or protocol vulnerabilities, another approach is needed to prove the vulnerability of the wireless LAN. This paper proposes the wireless MITM (Man in the Middle) Framework, which can actively prove the vulnerability of MITM by applying the MITM technique in the wireless LAN environment, whose security is applied using 802.1X and EAP. It also describes the designing of the required functions and modules. This paper proposes that it is possible to collect the wireless LAN authentication information of the unauthorized user using the designed Wireless MITM-Framework under the EAP-MD5 and EAPTTLS environment.
UR - http://www.scopus.com/inward/record.url?scp=48349106601&partnerID=8YFLogxK
U2 - 10.1109/ICISS.2008.10
DO - 10.1109/ICISS.2008.10
M3 - Conference contribution
AN - SCOPUS:48349106601
SN - 076953080X
SN - 9780769530802
T3 - Proceedings of the International Conference on Information Science and Security, ICISS 2008
SP - 164
EP - 170
BT - Proceedings of the International Conference on Information Science and Security, ICISS 2008
PB - IEEE Computer Society
T2 - International Conference on Information Science and Security, ICISS 2008
Y2 - 10 January 2008 through 12 January 2008
ER -