Skip to main content
Top

2022 | OriginalPaper | Chapter

An Investigation into How Smartphones Can Be Secured Against MiTM Attacks: Financial Sector

Authors : David Steiner-Otoo, Hamid Jahankhani

Published in: Blockchain and Other Emerging Technologies for Digital Business Strategies

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

MiTM attack aims to violate data in transmission through the air medium in a wireless network; MITM exploits compromise data confidentiality and integrity and are conceivably the most productive types of cyberattacks utilised today. The increasing use of personal devices like smartphones connecting to the internet via Wi-Fi has made wireless attacks on users more crucial. The cyber adversary becomes a “middleman” between two targets to intercept private communication, decrypt traffic, and exploit valuable information like bank details and credit cards. The new WPA3 protocol security features such as 256-bit encryption, OWE (Opportunistic Wireless Encryption), Simultaneous Authentication of Equals (SAE), and disallowing outdated legacy protocols provides risk mitigation against attacks. However, vulnerabilities in WPA3 have been reported whereby a device can be downgraded from WPA3 to WPA2, which opens the system up for DoS and MiTM attacks. This research investigates Wi-Fi-based exploits against the ecosystem of smartphones in the financial sector. Aircrack-ng and Ettercap are open-source tools accessible through the Kali Linux framework. These tools are utilised to demonstrate simulated DoS and MiTM attacks to explain the reported WPA3 vulnerabilities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Cyber-dependent crime is an offence, “that can only be committed using a computer, computer networks or other form of information communications technology (ICT)”. Cyber-enabled crimes are, “traditional crimes, which can be increased in their scale or reach by use of computers, computer networks or other forms of information communications technology (ICT)” (McGuire and Dowling 2013).
 
Literature
15.
go back to reference Malik A, Ahsan AShahadat MMZ, Tsou JC (2019) Understanding man-in-the-middle through a survey of the literature. Available online at: https://www.google.co.uk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiljOzTzdb0AhWNGewKHTdaA28QFnoECAIQAQ&url=https%3A%2F%2Fpdfs.semanticscholar.org%2Fc2c7%2F182b3fce4003e4dff71c0ed85e0a34aaf830.pdf&usg=AOvVaw0rUR5MgqsKmLdBetYaI182. [Accessed on: 9th Dec 2021] Malik A, Ahsan AShahadat MMZ, Tsou JC (2019) Understanding man-in-the-middle through a survey of the literature. Available online at: https://​www.​google.​co.​uk/​url?​sa=​t&​rct=​j&​q=​&​esrc=​s&​source=​web&​cd=​&​cad=​rja&​uact=​8&​ved=​2ahUKEwiljOzTzdb​0AhWNGewKHTdaA28​QFnoECAIQAQ&​url=​https%3A%2F%2Fpdfs.semanticscholar.org%2Fc2c7%2F182b3fce4003e4dff71c0ed85e0a34aaf830.pdf&usg=AOvVaw0rUR5MgqsKmLdBetYaI182. [Accessed on: 9th Dec 2021]
100.
go back to reference Gulasekaran SR, Sankaran SG (2021) Wi-Fi 6 protocol and network. Artech House, Norwood, MA Gulasekaran SR, Sankaran SG (2021) Wi-Fi 6 protocol and network. Artech House, Norwood, MA
108.
go back to reference Kovacic S, Dulic E, Sehidic A (2017) Improving the security of access to network resources using the 802.1x standard in wired and wireless environments. Available online at: [Accessed on 16th Oct 2021] Kovacic S, Dulic E, Sehidic A (2017) Improving the security of access to network resources using the 802.1x standard in wired and wireless environments. Available online at: [Accessed on 16th Oct 2021]
Metadata
Title
An Investigation into How Smartphones Can Be Secured Against MiTM Attacks: Financial Sector
Authors
David Steiner-Otoo
Hamid Jahankhani
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-98225-6_7