Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Research of man-in-the-middle attack in robust security network
WANG Ding MA Chun-guang WENG Chen JIA Chun-fu
Journal of Computer Applications    2012, 32 (01): 42-44.   DOI: 10.3724/SP.J.1087.2012.00042
Abstract1302)      PDF (639KB)(783)       Save
Man-in-the-Middle (MitM) attacks pose severe threats to the Robust Security Network (RSN). Based on the state machine model of the authenticator and supplicant in 802.1X-2004, MitM attacks were analyzed systematically from the respect of the whole establishment of RSN associations. With the unilateral cognition of the MitM attacks in RSN clarified, a framework for the MitM attacks in RSN and its conditions of the effective launch of the attacks were brought forward, which were fully verified by an effective attack instance. The analytical results reveal that RSN can withstand MitM attacks if strong mutual authentication methods are adopted; otherwise it is vulnerable to this threat.
Reference | Related Articles | Metrics