Eduroam enables students and staff members to easily connect to the Wi-Fi network at any university.
© Roberto Schirdewahn

Password security The pitfalls of eduroam

Many users configure their mobile devices in such a way that hackers can easily gain access to their personal data.

Using your home uni’s login data to access the Wi-Fi network of every other university – eduroam is the key. But users who don’t configure their computers or mobile phones correctly are at risk to be snooped on online. Researchers in the work group Information Security have found out: the login data and password on almost 50 per cent of the 1,300 tested user devices were not theft-proof.

Attackers set up fake access point

The idea behind eduroam (short for education roaming) is simple, yet brilliant: students and members of staff who spend a certain period of time at another university are able to use their home university’s login data to log into the Wi-Fi network of the university they are visiting – this saves time and effort, because there’s no need to apply for guest access. But any new technology will sooner or later attract hackers.

This is also the case with eduroam. Here, the attacker uses a laptop and a radio antenna to set up a fake access point; this enables him to find out password and user name. “If an attacker reads those data, he will gain access to many university services, including the user’s email account,” says Christina Pöpper, who has been heading the work group Information Security since 2013.

Fifty per cent of the tested devices vulnerable

She and her colleagues performed spot checks to identify how many devices at RUB are not sufficiently protected. In 2015 it turned out that almost 50 per cent of the 1,275 tested devices were vulnerable to attacks, pretty much like in the previous year. “The eduroam system is well thought-out,” explains the researcher. “However, it is based on the idea that users carry out all relevant installations on their devices. They constitute the best protection from attacks – provided they are performed correctly.” What kind of installations and how to run them is explained on the computer centre web pages.

Detailed article in Rubin, the RUB’s science magazine

A detailed article with pictures can be found in the online magazine Rubin, the RUB’s science magazine. Text and images in the download page are free to use for editorial purposes, provided the relevant copyright notice is included.

Press contact

Prof Dr Christina Pöpper
Information Security Group
Horst Görtz Institute for IT-Security
Ruhr-Universität Bochum
Germany
Phone: +49 234 32 27391
Email: christina.poepper@rub.de

Unpublished

By

Raffaela Römer

Share