Using end-to-middle security to protect against evil twin access points
- 1 June 2009
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The term Evil Twin refers to a type of rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the Internet. This paper generalizes a known technique into a model we call ldquoend-to-middle security,rdquo which can be adopted by mobile users to protect against Evil Twin attacks. This model involves using a virtual gateway to securely relay traffic for mobile users. Our intention of formalizing this model is to gain wider awareness of its effectiveness, and to encourage more solution implementations that target on the less programmable mobile devices such as game consoles and VoIP phones. We also derive a minimal set of requirements to verify the correctness of implementation. Towards the end, this paper also provides suggestions to mitigate possible delay in traffic transmission as a result of adopting this model.Keywords
This publication has 9 references indexed in Scilit:
- Detecting rogue access points using client-side bottleneck bandwidth analysisComputers & Security, 2008
- Mitigating Evil Twin Attacks in 802.11Published by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Rogue access point detection using segmental TCP jitterPublished by Association for Computing Machinery (ACM) ,2008
- A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Simple and effective defense against evil twin access pointsPublished by Association for Computing Machinery (ACM) ,2008
- RIPPSACM Transactions on Information and System Security, 2008
- Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairsPublished by Association for Computing Machinery (ACM) ,2007
- Rogue Access Point Detection by Analyzing Network Traffic CharacteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Rogue access point detection using temporal traffic characteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005