Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
All-or-Nothing Encryption and the Package Transform
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
A framework for wireless LAN monitoring and its applications
Proceedings of the 3rd ACM workshop on Wireless security
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Self-management in chaotic wireless deployments
Proceedings of the 11th annual international conference on Mobile computing and networking
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A phased array antenna testbed for evaluating directionality in wireless networks
MobiEval '07 Proceedings of the 1st international workshop on System evaluation for mobile platforms
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
ICDCS '08 Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
Introduction to Space-Time Wireless Communications
Introduction to Space-Time Wireless Communications
Wireless LAN security and IEEE 802.11i
IEEE Wireless Communications
Hi-index | 0.00 |
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers by using smart antennas. While conventional cryptography-based approaches focus on hiding the meaning of the information being communicated from the eavesdropper, we consider a complimentary class of strategies that limit knowledge of the existence of the information from the eavesdropper. We profile the performance achievable with simple beamforming strategies using a newly defined metric called exposure region. We then present three strategies within the context of an approach called Aegis, which uses virtual arrays of physical arrays to significantly improve the exposure region performance of a wireless LAN environment. Using simulations, analysis, and field trials, we validate and evaluate the proposed strategies.