Vis enkel innførsel

dc.contributor.authorIdland, Christernb_NO
dc.contributor.authorJelle, Thomasnb_NO
dc.contributor.authorMjølsnes, Stig Frodenb_NO
dc.date.accessioned2014-12-19T14:15:56Z
dc.date.available2014-12-19T14:15:56Z
dc.date.created2013-10-28nb_NO
dc.date.issued2013nb_NO
dc.identifier659971nb_NO
dc.identifier.issn1867-8211nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262899
dc.description.abstractMany wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then uses the still whitelisted MAC address for the network access. We propose and experiment with “implementation fingerprints” that can be used to detect MAC layer spoofing in this setting. We include eight different tests in the detection algorithm, resulting in 2.8 in average Hamming distance of the tests. Eleven different STA devices are tested with promising detection results. No precomputed database of fingerprints is needed.nb_NO
dc.languageengnb_NO
dc.publisherSpringernb_NO
dc.titleDetection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprintsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.source.pagenumber283-301nb_NO
dc.source.volume114nb_NO
dc.source.journalLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineeringnb_NO
dc.identifier.doi10.1007/978-3-642-39891-9_18nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel