IEEE Local Computer Network Conference 2010
DOI: 10.1109/lcn.2010.5735754
|View full text |Cite
|
Sign up to set email alerts
|

An inconvenient truth about tunneled authentications

Abstract: In recent years, it has been a common practice to execute client authentications for network access inside a protective tunnel. Man-in-the-middle (MitM) attacks on such tunneled authentications have been discovered early on and cryptographic bindings are widely adopted to mitigate these attacks. In this paper, we shake the false sense of security given by these so-called protective tunnels by demonstrating that most tunneled authentications are still susceptible to MitM attacks despite the use of cryptographic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…-As mentioned in [8] most tunneled authentication schemes are susceptible to Man-In-The-Middle attacks. In the proposed protocol we solved this problem simply by using two innovative methods we used in this protocol.…”
Section: B Attack Resistancementioning
confidence: 99%
“…-As mentioned in [8] most tunneled authentication schemes are susceptible to Man-In-The-Middle attacks. In the proposed protocol we solved this problem simply by using two innovative methods we used in this protocol.…”
Section: B Attack Resistancementioning
confidence: 99%