Abstract
Public Wi-Fi is a service provided for anyone to use at public places such as community centers, welfare facilities and traditional markets in cooperation with telecommunication service provider of South Korea such as KT, SKT and LGU+. The government is building and expanding public Wi-Fi zones in a bid to reduce the telecommunication cost of all people and ease the gap in the wireless internet use by region and income. It aimed to establish 12,000 public Wi-Fi zones in and around welfare facilities and traditional markets by 2017 (7000 new ones and 5000 open to public by the telecommunication service providers). The public Wi-Fi policy made it possible for people to use it for free at most of those places and eventually reduce their telecommunication cost. However, the service is vulnerable to various security threats. The study reviewed ways to reduce possible infringement of users’ personal information and vulnerability by simulating and examining scenarios under which the vulnerability can take place. Threats arising from the vulnerability may lead to infringement of personal information and sensitive information as well as additional attacks through unauthorized communication channels. Therefore, the study introduced problems attributable to the process of connecting to public Wi-Fi and investigated types of attack that can happen in the process and ways to address them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://www.msit.go.kr/web/msipContents/contentsView.do?cateId=mssw311&artId=136267
IEEE. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11 (2012)
http://www.ktword.co.kr/abbr_view.php?nav=&m_temp1=2319&mgid=148
Sidiropoulos, N., et al.: Open Wifi SSID Broadcast vulnerability, SSN Project Assessment (2012)
Ong, I.: WiFi optimizations to improve SSID priority to enhance overall quality of experience. In: 2016 Spring Technical Forum Proceedings
https://www.wi-fi.org/ko/news-events/newsroom/wi-fi-certified-passpoint
https://www.arubanetworks.com/assets/wp/WP_Passpoint_Wi-Fi.pdf
Eilam, E.: REVERSING: Secrets of Reverse Engineering. Amazon Digital Services LLC
Beyah, R., et al.: Rogue access point detection using temporal traffic characteristics, pp. 2271–2275, vol. 4, IEEE Global Telecommunications Conference (2004)
Ornaghi, A., et al.: Man in the middle attacks. Blackhat Conference–Europe (2003)
Bharti, A.K., et al.: A review on detection of session Hijacking and Ip spoofing, vol. 4, no. 9 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Park, J., Son, B., Park, J., Kim, M., Yim, K. (2020). Unintended Certificate Installation into Remote IoT Nodes. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_81
Download citation
DOI: https://doi.org/10.1007/978-3-030-22263-5_81
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22262-8
Online ISBN: 978-3-030-22263-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)