Thwarting ’stealth attacks’ a wireless security must

The profusion of wireless communications in homes, in coffee shops and even on battlefields presents us with fantastic new conveniences — but also new security problems. Indiana University computer scientist Markus Jakobsson will discuss “stealth” attacks over wireless networks, which can disrupt communications and endanger personal information. One such attack is “denial of service,” in which devices are overloaded with so much incoming information they cease functioning properly.


Jakobsson will also discuss “man in the middle” attacks, in which a miscreant invisibly inserts himself into the communication path of two wireless devices, such as cell phones, PDAs, or wireless-enabled laptop computers.

By manipulating software protocols, a man-in-the-middle attacker can silently pass information between two legitimate points while listening in to the wireless conversation, gleaning sensitive personal information or just plain sabotaging the connection. Stealth attacks over wireless networks threaten the security of personal information, online banking and purchasing. Such attacks may also endanger military personnel, who increasingly rely on wireless communications for maneuvering orders and reconnaissance. Defending against stealth attacks in the civilian sector, Jakobsson argues, will require a concerted effort to develop and distribute new software.

Jakobsson is an associate director of the IU Center for Applied Cybersecurity Research and an associate professor in IU’s School of Informatics. A stealth attack FAQ written by Jakobsson is here: http://www.stealth-attacks.info/.

“Stealth Attacks on Wireless Networks”
Saturday, February 19, 9:45 – 11:15 a.m.

Jakobsson and colleagues will present new findings and position statements on Internet security during a press conference on Saturday, Feb. 19, at 8:30 a.m. in the Marriott Wardman Park Hotel’s Taft Room.

Media Contact

David Bricker EurekAlert!

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

Cichlids practicing brood care in 3D-printed snail shells

Time to Leave Home? Revealed Insights into Brood Care of Cichlids

Shell-dwelling cichlids take intense care of their offspring, which they raise in abandoned snail shells. A team at the Max Planck Institute for Biological Intelligence used 3D-printed snail shells to…

Amphiphile-enhanced wearable fabric generating electricity from movement

Smart Fabrics: Innovative Comfortable Wearable Tech

Researchers have demonstrated new wearable technologies that both generate electricity from human movement and improve the comfort of the technology for the people wearing them. The work stems from an…

Visualization of Atlantic Meridional Overturning Circulation (AMOC) stability over 60 years

Going Steady—Study Reveals North Atlantic’s Gulf Stream Remains Robust

A study by the University of Bern and the Woods Hole Oceanographic Institution in the USA concludes that the ocean circulation in the North Atlantic, which includes the Gulf Stream,…