Proceedings of the 7th ACM Symposium on QoS and Security for Wireless and Mobile Networks 2011
DOI: 10.1145/2069105.2069110
|View full text |Cite
|
Sign up to set email alerts
|

Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code

Abstract: With the recent explosion in wireless hotspots, more and more users find themselves browsing the internet in an insecure manner. This is due to the typical lack of security in the Wi-Fi Access Points at popular hotspots such as coffee shops and airports. A common vulnerability in this scenario is when a user's cookie information is transmitted in plain-text, exposing potential session information. This would typically include the session id, which, if stolen, could lead to session hijacking, also known as side… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The hash chain approach used by the OTC scheme generates a sequence of values to be used as authentication tokens which cannot be reused once recognized by the web application. Another approach, the Rolling Code protocol [8], replaces the hash chain by two hash operations in each transaction: one to compute a randomized value d and the other to produce a one-time authentication token by applying a hash function on the Exclusive-OR of a secret seed and the random value d. The protocol is less secure than OTC but is lightweight and more suitable for devices with low memory capabilities. The SCRHC protocol [9] also uses a similar OHC approach equipped with different levels of caching to suit various environments with different memory capacities.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The hash chain approach used by the OTC scheme generates a sequence of values to be used as authentication tokens which cannot be reused once recognized by the web application. Another approach, the Rolling Code protocol [8], replaces the hash chain by two hash operations in each transaction: one to compute a randomized value d and the other to produce a one-time authentication token by applying a hash function on the Exclusive-OR of a secret seed and the random value d. The protocol is less secure than OTC but is lightweight and more suitable for devices with low memory capabilities. The SCRHC protocol [9] also uses a similar OHC approach equipped with different levels of caching to suit various environments with different memory capacities.…”
Section: Previous Workmentioning
confidence: 99%
“…In this case, the dynamic TTOHC configuration would be practically acceptable because the early (more certain) transactions would be authenticated by second-tier chains of small lengths (e.g., 1,2,4,8) and are therefore given good performance. …”
Section: Dynamic N Smentioning
confidence: 99%
“…In [6], we presented a protocol to prevent cookie hijacking in wireless networks. The protocol, called Rolling Code, utilizes the initial secure HTTPS authentication to exchange a shared secret between the server and the user browser.…”
Section: Previous Workmentioning
confidence: 99%
“…In this section, we extend our work in [6] and present a security authentication protocol for mitigating the risk of hijacking social networking sites. It is important to stress that our protocol is only intended to prevent attacks related to cookie hijacking in social networks.…”
Section: Authentication Protocolmentioning
confidence: 99%
See 1 more Smart Citation