In my thesis, I reviewed attack methods performed against users of wireless networks. I have inspected, what are the structures of these methods and presented a few examples, which use these with special interest in mobile devices.
I reviewed, what are the commonly used defense mechanisms nowadays in different environments. These environments are home, enterprise and public networks. I presented the problems with the current solutions used in public networks and sketched a possible alternative, which could give solution for these issues.
The main idea behind my solution is that this way users will be able to verify the identity of the network device, which they connect to. Also, it has been important to separate users’ traffic, hiding their communication from each other. This can prevent sniffings and man in the middle attacks.
After theoretical oversight, I described the designation, implementation and testing of my application, which defends users against attacks, which could not be prevented in all cases, and even if they could, it was really hard from the perspective of the network operator.