According to a recent report by the Daily Science Network of the United States, researchers at the Massachusetts Institute of Technology showed the first security plan that can automatically establish a connection between wireless devices and resist man-in-the-middle attacks, making wireless network security easier to obtain.
Man-in-the-middle attack is when an attacker inserts himself between two other wireless devices. It can attack any type of wireless connection, including devices (such as mobile phones or laptops) and base stations (mobile phone towers or wireless routers), and can also penetrate between mobile phones and wireless headsets, between medical implants and wrist displays, or between computers and Between wireless speaker systems. It can destroy Wi-Fi devices.
In the past, blocking attacks required password protection or some additional communication mechanisms. But Douglas Ross (1954) Nikolai Zeldovic, assistant professor of career development in software technology, said: "None of these solutions is very satisfactory." When two wireless devices establish a secure connection, they will exchange keys Once a man-in-the-middle attack occurs, the attacker can transmit his own key during key exchange and intercept the transmission. In addition, in some public places that can provide wireless networks, because of the same password, any one of the users can launch a man-in-the-middle attack against others. The average computer user usually chooses a wireless signal transmitter with a button configuration to ensure security, but it is still vulnerable to man-in-the-middle attacks.
Zeldovic and Associate Professor of Electrical Engineering and Computer Science at MIT Dina Katabi, postdoctoral Nabil Ahmed and graduate student Shiam Grakoda jointly proposed this new Security plan. It can detect an attempt by an attacker to suppress signals emitted by legitimate users during a man-in-the-middle attack. When the encryption key is transmitted, the legitimate user will transmit the second string, which will be encoded as an alternating conversion of radiated bursts and silence, which is different from the traditional key that is converted into a wireless signal and then encoded into radio waves Changes in amplitude.
This means that if an attacker attempts to replace the legitimate user's key, he will need to send a sequence corresponding to the burst and silence. But the sequence of different legitimate users is different from each other, and it is not compatible with the transmission key that can guide the man-in-the-middle attack. If an attacker tries to suppress all the legal transmission mechanisms and then sends his own key, it will take a very long duration, and this will warn the receiver that it is under attack.
A01 500 Puffs,A01 500 Puffs Yield,A01 500 Puffs Xl,A01 500 Puffs Vape
Lensen Electronics Co., Ltd , https://www.lensenvape.com