Abstract | ||
---|---|---|
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil twin" access points. These rogue access points are operated by criminals in an attempt to launch man-in-the-middle attacks. We present a simple protection mechanism against binding to an evil twin. The mechanism leverages short authentication string protocols for the exchange of cryptographic keys. The short string verification is performed by encoding the short strings as a sequence of colors, rendered sequentially by the user's device and by the designated access point of the cafe. The access point must have a light capable of showing two colors and must be mounted prominently in a position where users can have confidence in its authenticity. We conducted a usability study with patrons in several cafes and participants found our mechanism very usable. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1145/1352533.1352569 | WISEC |
Keywords | Field | DocType |
simple protection mechanism,evil twin,effective defense,cryptographic key,rogue access point,man-in-the-middle attack,public place,short string,access point,short string verification,evil twin access point,short authentication string protocol,man in the middle attack,wireless network,col | Protection mechanism,Wireless network,Internet privacy,Authentication,Wireless security,Computer security,Computer science,Usability,Computer network,Rogue access point,Key (cryptography),Evil twin | Conference |
Citations | PageRank | References |
40 | 2.10 | 19 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Volker Roth | 1 | 97 | 4.27 |
Wolfgang Polak | 2 | 40 | 2.44 |
Eleanor Rieffel | 3 | 488 | 48.71 |
Thea Turner | 4 | 243 | 14.41 |