Loading…
A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP
The security of wireless LAN is being strengthened through a combination of EAP with an 802.1X-based authentication server, with 802.11i as the standard. As such a security technique effectively defends the existing WEP or protocol vulnerabilities, another approach is needed to prove the vulnerabili...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The security of wireless LAN is being strengthened through a combination of EAP with an 802.1X-based authentication server, with 802.11i as the standard. As such a security technique effectively defends the existing WEP or protocol vulnerabilities, another approach is needed to prove the vulnerability of the wireless LAN. This paper proposes the wireless MITM (man in the middle) framework, which can actively prove the vulnerability of MITM by applying the MITM technique in the wireless LAN environment, whose security is applied using 802.1X and EAP. It also describes the designing of the required functions and modules. This paper proposes that it is possible to collect the wireless LAN authentication information of the unauthorized user using the designed wireless MLTM-framework under the EAP-MD5 and EAP-TTLS environment. |
---|---|
DOI: | 10.1109/ICISS.2008.10 |