The Community for Technology Leaders
2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2009)
Marrakech, Morocco
Oct. 12, 2009 to Oct. 14, 2009
ISBN: 978-0-7695-3841-9
pp: 394-399
ABSTRACT
Users of public Wi-Fi networks risk being tricked into connecting to ‘evil twin’ access points set up by attackers to launch man-in-the-middle attacks. We present a system which employs post hoc validation of an anonymous Diffie-Hellman key exchange undertaken as part of an 802.1X / EAP-TTLS network association process. Our system utilises an additional secure auxilliary channel to run a modified version of the Interlock protocol based on physical evidence in the network location. By using keying information generated during the network joining process, we allow spontaneous network users to detect man-in-the-middle attacks as well as avoiding the need for pre-shared keys. We report on implementations of our system which utilise physical evidence of authenticity in the alternative forms of public displays and 2D barcodes embedded in the environment and read by mobile phones.
INDEX TERMS
Wireless LAN, security, authentication
CITATION

E. O'Neill, C. Bevan, J. Mitchell, J. Grimmett and T. Kindberg, "Authenticating Public Wireless Networks with Physical Evidence," 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications(WIMOB), Marrakech, Morocco, 2009, pp. 394-399.
doi:10.1109/WiMob.2009.73
88 ms
(Ver 3.3 (11022016))