Cellular security: better, but foes still lurk
IEEE Spectrum
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
Wireless LAN location-sensing for security applications
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
The Horus WLAN location determination system
Proceedings of the 3rd international conference on Mobile systems, applications, and services
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Using client puzzles to protect TLS
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Regional-based authentication against dos attacks in wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Identifying unique devices through wireless fingerprinting
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Protecting your daily in-home activity information from a wireless snooping attack
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Proceedings of the 4th annual conference on Information security curriculum development
InfoSec technology management of user space and services through security threat gateways
Proceedings of the 4th annual conference on Information security curriculum development
Advancing wireless link signatures for location distinction
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
WSEAS TRANSACTIONS on COMMUNICATIONS
Jamming for good: a fresh approach to authentic communication in WSNs
Proceedings of the second ACM conference on Wireless network security
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
Physical Layer Attacks on Unlinkability in Wireless LANs
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Detecting spoofing attacks in mobile wireless environments
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
Detecting identity spoofs in IEEE 802.11e wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
The directional attack on wireless localization: how to spoof your location with a tin can
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Enhancing wireless security through reconfigurable antennas
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
A channel-based hypothesis testing approach to enhance user authentication in wireless networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
On channel-based user authentication for mobile terminals
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract)
Proceedings of the ACM SIGCOMM 2010 conference
SecureAngle: improving wireless security using angle-of-arrival information
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Zone-level occupancy counting with existing infrastructure
BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Journal of Computer and System Sciences
Hi-index | 0.00 |
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. For example, several link-layer services in IEEE 802.11 networks have been shown to be vulnerable to such attacks even when 802.11i/1X and other security mechanisms are deployed. In this paper we show that a transmitting device can be robustly identified by its signalprint, a tuple of signal strength values reported by access points acting as sensors. We show that, different from MAC addresses or other packet contents, attackers do not have as much control regarding the signalprints they produce. Moreover, using measurements in a testbed network, we demonstrate that signalprints are strongly correlated with the physical location of clients, with similar values found mostly in close proximity. By tagging suspicious packets with their corresponding signalprints, the network is able to robustly identify each transmitter independently of packet contents, allowing detection of a large class of identity-based attacks with high probability.