메뉴 건너뛰기




Volumn , Issue , 2008, Pages 220-225

Simple and effective defense against evil twin access points

Author keywords

Device pairing; Evil twin; Usable security; Wireless security

Indexed keywords

ACCESS POINTS; CRYPTOGRAPHIC KEYS; DEVICE PAIRING; EVIL TWIN; PROTECTION MECHANISMS; PUBLIC PLACES; TWO COLORS; USABILITY STUDIES; USABLE SECURITY; WIRELESS NETWORKINGS; WIRELESS SECURITY;

EID: 56649111524     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352533.1352569     Document Type: Conference Paper
Times cited : (61)

References (34)
  • 1
    • 56749162267 scopus 로고    scopus 로고
    • Ensnared on the wireless Web
    • March 16
    • ABDOLLAH, T. Ensnared on the wireless Web. Los Angeles Times, March 16 2007.
    • (2007) Los Angeles Times
    • ABDOLLAH, T.1
  • 3
    • 56749144583 scopus 로고    scopus 로고
    • BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA, February 2002).
    • BALFANZ, D., SMETTERS, D. K., STEWART, P., AND WONG, H. C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02) (San Diego, CA, February 2002).
  • 6
    • 33847247347 scopus 로고    scopus 로고
    • BUSSARD, L., AND ROUDIER, Y. Embedding distance-bounding protocols within intuitive interactions. In Proc. Conference on Security in Pervasive Computing (SPC'03) (Mar. 2003), 2802 of Lecture Notes in Computer Science, Springer Verlag, pp. 143-156.
    • BUSSARD, L., AND ROUDIER, Y. Embedding distance-bounding protocols within intuitive interactions. In Proc. Conference on Security in Pervasive Computing (SPC'03) (Mar. 2003), vol. 2802 of Lecture Notes in Computer Science, Springer Verlag, pp. 143-156.
  • 7
    • 3042520754 scopus 로고    scopus 로고
    • Public-key support for collaborative groups
    • Gaithersburg, Mayland, USA, Apr., National Institute for Standards and Technology, pp
    • DOHRMANN, S., AND ELLISON, C. Public-key support for collaborative groups. In Proc. 1st Annual PKI Research Workshop (Gaithersburg, Mayland, USA, Apr. 2002), National Institute for Standards and Technology, pp. 139-148.
    • (2002) Proc. 1st Annual PKI Research Workshop , pp. 139-148
    • DOHRMANN, S.1    ELLISON, C.2
  • 8
    • 56749144581 scopus 로고    scopus 로고
    • online at, January 20 2005
    • FLEISHMAN, G. My evil twin. Published online at http://wifinetnews.com/archives/004718.html, January 20 2005.
    • My evil twin. Published
    • FLEISHMAN, G.1
  • 9
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Jan
    • GEHRMANN, C., MITCHELL, C. J., AND NYBERG, K. Manual authentication for wireless devices. RSA Cryptobytes 7, 1 (Jan. 2004), 29-37.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • GEHRMANN, C.1    MITCHELL, C.J.2    NYBERG, K.3
  • 11
    • 56749136748 scopus 로고    scopus 로고
    • GROUP, T. S. Airsnarf. Published online at airsnarf.shmoo.com, Apr. 2007. Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots.
    • GROUP, T. S. Airsnarf. Published online at airsnarf.shmoo.com, Apr. 2007. Airsnarf is a simple wireless access point setup utility designed to demonstrate how a rogue access point can steal usernames and passwords from public wireless hotspots.
  • 13
    • 56749144582 scopus 로고    scopus 로고
    • KUO, C., WALKER, J., AND PERRIG, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
    • KUO, C., WALKER, J., AND PERRIG, A. Low-cost manufacturing, usability, and security: An analysis of Bluetooth simple pairing and Wi-Fi protected setup. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
  • 14
    • 84885941616 scopus 로고    scopus 로고
    • LAUR, S., AND NYBERG, K. Efficient mutual data authentication using manually authenticated strings. In Proc. 5th International Conference on Cryptology and Network Security (Suzhou, China, 2006), no. 4301 in Lecture Notes in Computer Science, Springer Verlag, pp. 90-107.
    • LAUR, S., AND NYBERG, K. Efficient mutual data authentication using manually authenticated strings. In Proc. 5th International Conference on Cryptology and Network Security (Suzhou, China, 2006), no. 4301 in Lecture Notes in Computer Science, Springer Verlag, pp. 90-107.
  • 16
    • 33947642342 scopus 로고
    • Secure communication method and apparatus. United states patent 5,450,493, United States Patent and Trademark
    • Office, Sept, Filed Dec. 29, 1993
    • MAHER, D. P. Secure communication method and apparatus. United states patent 5,450,493, United States Patent and Trademark Office, Sept. 1995. Filed Dec. 29, 1993.
    • (1995)
    • MAHER, D.P.1
  • 17
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-Is-Believing: Using camera phones for human-verifiable authentication
    • MCCUNE, J. M., PERRIG, A., AND REITER, M. K. Seeing-Is-Believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy (2005), pp. 110-124.
    • (2005) IEEE Symposium on Security and Privacy , pp. 110-124
    • MCCUNE, J.M.1    PERRIG, A.2    REITER, M.K.3
  • 18
    • 56749162264 scopus 로고    scopus 로고
    • Evil Twin hotspots are a new menace for internet users, warns cranfield university
    • United Kingdom, Jan, Available online at
    • MEADOWS, H. "Evil Twin" hotspots are a new menace for internet users, warns cranfield university. Press release, Cranfield University, Cranfield, Bedfordshire, MK43 0AL, United Kingdom, Jan. 2005. Available online at http://www.cranfield.ac.uk/university/press/2005/14012005.cfm.
    • (2005) Press release, Cranfield University, Cranfield, Bedfordshire, MK43
    • MEADOWS, H.1
  • 19
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: Some limits on our capacity for processing information
    • MILLER, G. A. The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review 63 (1956), 81-97.
    • (1956) Psychological Review , vol.63 , pp. 81-97
    • MILLER, G.A.1
  • 20
    • 56749089257 scopus 로고    scopus 로고
    • ORNAGHI, A., AND VALLERI, M. Ettercap. Available online at ettercap.sourceforge.net,Apr. 2007. Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks.
    • ORNAGHI, A., AND VALLERI, M. Ettercap. Available online at ettercap.sourceforge.net,Apr. 2007. Ettercap is a network sniffer with extensive support for Man-in-the-Mddle Attacks.
  • 22
    • 35248871953 scopus 로고    scopus 로고
    • REKIMOTO, J., AYATSUKA, Y., AND KOHNO, M. SyncTap: An interaction technique for mobile networking. In Human-computer interaction with mobile devices and services (Mobile HCI 2003) (2003), L. Chittaro, Ed., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104-115.
    • REKIMOTO, J., AYATSUKA, Y., AND KOHNO, M. SyncTap: An interaction technique for mobile networking. In Human-computer interaction with mobile devices and services (Mobile HCI 2003) (2003), L. Chittaro, Ed., no. 2795 in Lecture Notes in Computer Science, Springer Verlag, pp. 104-115.
  • 23
    • 0034272534 scopus 로고    scopus 로고
    • Service advertisement and discovery: Enabling universal device cooperation
    • RICHARD, G. G. Service advertisement and discovery: Enabling universal device cooperation. IEEE Internet Computing 4, 5 (2000), 18-26.
    • (2000) IEEE Internet Computing , vol.4 , Issue.5 , pp. 18-26
    • RICHARD, G.G.1
  • 24
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • SALTZER, J. H., AND SCHROEDER, M. D. The protection of information in computer systems. Communications of the ACM 17, 7 (July 1974).
    • (1974) Communications of the ACM , vol.17 , pp. 7
    • SALTZER, J.H.1    SCHROEDER, M.D.2
  • 29
    • 38149097247 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Technical Report NRC-TR-2007-004, Nokia Research Center, Jan
    • SUOMALAINEN, J., VALKONEN, J., AND ASOKAN, N. Security associations in personal networks: A comparative analysis. Technical Report NRC-TR-2007-004, Nokia Research Center, Jan. 2007.
    • (2007)
    • SUOMALAINEN, J.1    VALKONEN, J.2    ASOKAN, N.3
  • 30
    • 56749138826 scopus 로고    scopus 로고
    • Evil Twin
    • VNU Business Publications, November 23, Available online at
    • THOMSON, I. "Evil Twin" Wi-Fi hacks target the rich. VNU Business Publications, November 23 2006. Available online at www.vnunet.com/2169400.
    • (2006) Wi-Fi hacks target the rich
    • THOMSON, I.1
  • 31
    • 56749116530 scopus 로고    scopus 로고
    • UZUN, E., KARVONEN, K., AND ASOKAN, N. Usability analysis of secure pairing methods. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
    • UZUN, E., KARVONEN, K., AND ASOKAN, N. Usability analysis of secure pairing methods. In Proc. Usable Security Workshop (USEC) (Lowlands, Scarborough, Trinidad/Tobago, Feb. 2007). Co-located with 11th Conference on Financial Cryptography and Data Security.
  • 32
    • 33745156127 scopus 로고    scopus 로고
    • VAUDENAY, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology (CRYPTO) (2005), 3621 of Lecture Notes in Computer Science, Springer Verlag, pp. 309-326.
    • VAUDENAY, S. Secure communications over insecure channels based on short authenticated strings. In Proc. Advances in Cryptology (CRYPTO) (2005), vol. 3621 of Lecture Notes in Computer Science, Springer Verlag, pp. 309-326.
  • 33
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • Feb
    • ČAGALJ, M., CAPKUN, S., AND HUBAUX, J.-P. Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE 94, 2 (Feb. 2006), 467-478.
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • ČAGALJ, M.1    CAPKUN, S.2    HUBAUX, J.-P.3
  • 34
    • 1942455789 scopus 로고    scopus 로고
    • Neural activity predicts individual differences in visual working memory capacity
    • Apr
    • VOGEL, E. K., AND MACHIZAWA, M. G. Neural activity predicts individual differences in visual working memory capacity. Nature 428 (Apr. 2004), 748-751.
    • (2004) Nature , vol.428 , pp. 748-751
    • VOGEL, E.K.1    MACHIZAWA, M.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.