Securing Emerging Wireless Systems 2008
DOI: 10.1007/978-0-387-88491-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Localizing Wireless Spoofing Attacks

Abstract: Abstract-Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wirele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
3
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
1
3
0
Order By: Relevance
“…Faria and Cheriton [6] proposed 'signalprints', which are tags for signal patterns correlated to physical locations. Both Chen et al [27] and Sheng et al [13] proposed per-frame RSS analysis based on multiple sensor monitoring, which is similar to our previous work. These works assumed that RSS values of one transmitter would follow a Gaussian distribution and thereafter used N sensors' observations as N-dimensional vectors to profile their testing environments.…”
Section: Related Worksupporting
confidence: 71%
“…Faria and Cheriton [6] proposed 'signalprints', which are tags for signal patterns correlated to physical locations. Both Chen et al [27] and Sheng et al [13] proposed per-frame RSS analysis based on multiple sensor monitoring, which is similar to our previous work. These works assumed that RSS values of one transmitter would follow a Gaussian distribution and thereafter used N sensors' observations as N-dimensional vectors to profile their testing environments.…”
Section: Related Worksupporting
confidence: 71%
“…Considerable research has been conducted on detecting and/or mitigating spoofing within the medium access control (MAC) layer of the open systems interconnection (OSI) stack [1,2]. There has been a recent shift toward providing added security at the OSI Physical (PHY) layer by exploiting RF features 72 R. W. KLEIN, M. A. TEMPLE AND M. J. MENDENHALL RF fingerprinting is one alternative PHY layer approach that is readily dismissed in Reference [2] for 'scale' reasons.…”
Section: Introductionmentioning
confidence: 99%
“…Much of the discussed work has suggested using channel measurements gathered at multiple receivers in order to perform location distinction [5], [1], [7], [4], [18]. However, in typical WiFi networks, adjacent access points are set to operate on different channels in order to reduce interference and clients operate on a single channel.…”
Section: R Elated Workmentioning
confidence: 99%