Hotspot securityPosted: January 19, 2015
Security is a serious concern in connection with Hotspots.
Whilst it is difficult not to be too technical, there are three possible areas of attack:
First, there is the wireless connection between the client and the access point. This needs to be encrypted, so that the connection cannot be eavesdropped or attacked by a man-in-the-middle-attack.
Second, there is the Hotspot itself. The WLAN encryption ends at the interface, then travels its network stack unencrypted and then travels over the wired connection up to the BRAS of the ISP.
Third, there is the connection from the Access Point to the Internet Service Provider.
The safest method when accessing the Internet over a Hotspot, with unknown security measures, is end-to-end encryption. These are your typical corporate VPN clients. However, most mobile phones and tablets do not possess standard corporate protection or anti-virus measures.
Some hotspots authenticate users; however, this does not prevent users from viewing network traffic using packet sniffers.
“Spoof” or alias naming, where users connect to intermediately web pages, before their information is passed to the destination webpages are very common and software is available for as low as $40 to allow hackers to set up these networks.
Some vendors provide a download option that deploys WPA support. This conflicts with enterprise configurations that have solutions specific to their internal WLAN.
Providers of public hotspot access may incur legal obligations, including privacy requirements and liability for use for unlawful purposes, depending on the jurisdiction. It will be interesting to see in terms of recent POPI legislation in South Africa, whether the onus will transfer to the Wi-Fi hotspot provider or remain with the user.
In order to provide robust security to hotspot users, the Wi-Fi Alliance is developing a new hotspot program that aims to encrypt hotspot traffic with WPA2 security. The program was scheduled to launch, but many delays mean this program is still many years away from providing any end-user protection.
Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint, is an approach to public access Wi-Fi by the Wi-Fi Alliance. The idea is for mobile devices to automatically join a Wi-Fi subscriber service whenever the user enters a Hotspot 2.0 area, in order to provide better bandwidth and services-on-demand to end-users, whilst also alleviating mobile carrier infrastructure of traffic overheads.
Hotspot 2.0 is based on the IEEE 802.11u standard, which is a set of protocols published in 2011 to enable cellular-like roaming. If the device supports 802.11u and is subscribed to a Hotspot 2.0 service it will automatically connect and roam. However device manufacturers and Wi-Fi Hotspot providers will need to update their equipment (and users their devices!) before this security measure becomes meaningful.