The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Towards highly reliable enterprise network services via inference of multi-level dependencies
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Proceedings of the 14th ACM international conference on Mobile computing and networking
Practical attacks against WEP and WPA
Proceedings of the second ACM conference on Wireless network security
Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Detailed diagnosis in enterprise networks
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
SAM: enabling practical spatial multiple access in wireless LAN
Proceedings of the 15th annual international conference on Mobile computing and networking
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
DOF: a local wireless information plane
Proceedings of the ACM SIGCOMM 2011 conference
Precise indoor localization using PHY layer information
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
SpinLoc: spin once to know your location
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
Towards fine-grained radio-based indoor location
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
You are facing the Mona Lisa: spot localization using PHY layer information
Proceedings of the 10th international conference on Mobile systems, applications, and services
No need to war-drive: unsupervised indoor localization
Proceedings of the 10th international conference on Mobile systems, applications, and services
FM-based indoor localization via automatic fingerprint DB construction and matching
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Avoiding multipath to revive inbuilding WiFi localization
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Hi-index | 0.00 |
Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a security risk to the entire network. To address this problem, we propose SecureAngle, a system designed to operate alongside existing wireless security protocols, adding defense in depth. SecureAngle leverages multi-antenna APs to profile the directions at which a client's signal arrives, using this angle-of-arrival (AoA) information to construct signatures that uniquely identify each client. We identify SecureAngle's role of providing a fine-grained location service in a multi-path indoor environment. With this location information, we investigate how an AP might create a "virtual fence" that drops frames received from clients physically located outside a building or office. With SecureAngle signatures, we also identify how an AP can prevent malicious parties from spoofing the link-layer address of legitimate clients. We discuss how SecureAngle might aid whitespace radios in yielding to incumbent transmitters, as well as its role in directional downlink transmissions with uplink AoA information.