Recently smartphone users is growing and AP are installed in public places while increasing. But AP’s have been shared without the most secure in public areas. In addition, a free smartphone application that uses the Internet are being developed to communicate with the server without a page advertising the security process. In this environment, Attacker can obtain the personal information of the number of users of the user and the AP interrupt and a MITM attack, connect to a shared AP. In this paper, we try a MITM attack against the real application report and the result is analyzed. In addition, the application corresponding to the MITM attack in unreliable AP Environment - offers a secure communication between the server and the model evaluation by applying them to the attack scenario.
[1]
William A. Arbaugh,et al.
Your 80211 wireless network has no clothes
,
2002,
IEEE Wirel. Commun..
[2]
Hugo Krawczyk,et al.
Keying Hash Functions for Message Authentication
,
1996,
CRYPTO.
[3]
William Stallings,et al.
Cryptography and network security (2nd ed.): principles and practice
,
1998
.
[4]
Bart Preneel,et al.
MDx-MAC and Building Fast MACs from Hash Functions
,
1995,
CRYPTO.
[5]
P. Krishnamurthy,et al.
A new authentication mechanism for loosely coupled 3G-WLAN integrated networks
,
2004,
2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).