DoS and authentication in wireless public access networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Your 80211 wireless network has no clothes
IEEE Wireless Communications
Security aspects of 3G-WLAN interworking
IEEE Communications Magazine
Hi-index | 0.00 |
The convenience of Wireless LAN and the deployment of 3G network make the cross platform/network services (CPS) are getting popular. The core reasons for vulnerabilities for CPS stems from the transform of data and control messages and protocol translation occurred in cross networks and platforms operations. During the translation/transcoding, new threats could be introduced as it may go beyond of data cryptography. We particularly investigate the threats facing in Internet-3G-WiFi and propose the architecture of the secure CPS (SCPS). We illustrate newly defined five types of attacks uniquely in CPS and analyze the traditional attacks (TA) and the cross platform attacks (CPA) which are conducted mode and propose the corresponding countermeasures to the attacks in the cross platform.