A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP

Hwang Hyunuk, Jung Gyeok, Sohn Kiwook, Park Sangseo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

48 Scopus citations

Abstract

The security of wireless LAN is being strengthened through a combination of EAP with an 802.1X-based authentication server, with 802.11i as the standard. As such a security technique effectively defends the existing WEP or protocol vulnerabilities, another approach is needed to prove the vulnerability of the wireless LAN. This paper proposes the wireless MITM (Man in the Middle) Framework, which can actively prove the vulnerability of MITM by applying the MITM technique in the wireless LAN environment, whose security is applied using 802.1X and EAP. It also describes the designing of the required functions and modules. This paper proposes that it is possible to collect the wireless LAN authentication information of the unauthorized user using the designed Wireless MITM-Framework under the EAP-MD5 and EAPTTLS environment.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Information Science and Security, ICISS 2008
PublisherIEEE Computer Society
Pages164-170
Number of pages7
ISBN (Print)076953080X, 9780769530802
DOIs
StatePublished - 2008
EventInternational Conference on Information Science and Security, ICISS 2008 - Seoul, Korea, Republic of
Duration: 10 Jan 200812 Jan 2008

Publication series

NameProceedings of the International Conference on Information Science and Security, ICISS 2008

Conference

ConferenceInternational Conference on Information Science and Security, ICISS 2008
Country/TerritoryKorea, Republic of
CitySeoul
Period10/01/0812/01/08

Fingerprint

Dive into the research topics of 'A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP'. Together they form a unique fingerprint.

Cite this