Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy 2020
DOI: 10.1145/3411498.3419968
|View full text |Cite
|
Sign up to set email alerts
|

MAC-Layer Spoofing Detection and Prevention in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…IoT uses the MAC address to authenticate wireless networks at the data link layer. Spoofing attacks occur when malicious entities imitate legitimate users' MAC addresses to gain network access illegally, affecting the data confidentiality and integrity of the environment [106]. Lack of data confidentiality means unauthorized/malicious actors may know the contents of data, whereas lack of integrity means the data may have been amended, altered, tampered or discarded.…”
Section: ) the Network Layermentioning
confidence: 99%
“…IoT uses the MAC address to authenticate wireless networks at the data link layer. Spoofing attacks occur when malicious entities imitate legitimate users' MAC addresses to gain network access illegally, affecting the data confidentiality and integrity of the environment [106]. Lack of data confidentiality means unauthorized/malicious actors may know the contents of data, whereas lack of integrity means the data may have been amended, altered, tampered or discarded.…”
Section: ) the Network Layermentioning
confidence: 99%
“…MAC address is used on data link layer and considered as an authentication factor for wireless networks in IoT. In a spoofing attack, the malicious entity modifies the MAC address to some forged value that belongs to the valid user and obtains illegal benefits in the network [10]. To detect spoofing attacks, physical layer authentication is used through RSS.…”
Section: Of 16mentioning
confidence: 99%
“…However, there are serious security issues with Wi-Fi networks. Attackers can obtain the identity information of a valid device through wireless sniffing and then use this information to disguise themselves as legitimate devices [2,3]. Attackers can steal confidential data or attack the internal websites after getting authorization [4,5], or they can control other devices by sending spurious instructions [6].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, attempts have been made to use wireless channel characteristics for device authentication. One approach is to extract fine-grained fingerprints that can identify the device from the CSI and use fingerprint matching to authenticate the device [3,[13][14][15][16]. CSI refers to the channel frequency response (CFR) of a wireless multipath channel, including the amplitude attenuation and phase shift of the channel.…”
Section: Introductionmentioning
confidence: 99%