Download Now Free registration required
Security protocols are not as secure as one assumed. This paper identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through experiments, the author shows that even the latest strongly authenticated protocols such as PEAP, EAP-TLS and EAP-TTLS are vulnerable to these attacks. Real attacks have been implemented and tested against TLS-based EAP protocols, the major family of security protocols for Wireless LAN, as well as the Return Routability of Mobile IPv6, an emerging lightweight security protocol in new IPv6 infrastructure. DoS attacks on PEAP, one popular TLS-based EAP protocol were performed and tested on a major university's wireless network, and the attacks were highly successful.
- Format: PDF
- Size: 560.9 KB