메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2544-2552

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL DYNAMICS; COLLABORATIVE ENVIRONMENTS; DESIGN AND IMPLEMENTS; NOVEL TECHNIQUES; OFF-THE-SHELF HARDWARES; SOURCE AUTHENTICATION; SPATIAL DECORRELATION; SPOOFING ATTACKS;

EID: 84883094081     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6567061     Document Type: Conference Paper
Times cited : (90)

References (29)
  • 1
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proceedings of the USENIX Security Symposium, 2003, pp. 15-28.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 2
    • 33144479525 scopus 로고    scopus 로고
    • Scan: Self-organized networklayer security in mobile ad hoc networks
    • Selected Areas in Communications
    • H. Yang, J. Shu, X. Meng, and S. Lu, "Scan: self-organized networklayer security in mobile ad hoc networks," Selected Areas in Communications, IEEE Journal on, 2006.
    • (2006) IEEE Journal on
    • Yang, H.1    Shu, J.2    Meng, X.3    Lu, S.4
  • 6
    • 84861639032 scopus 로고    scopus 로고
    • A formal analysis of IEEE 802.11w deadlock vulnerabilities
    • M. Eian and S. F.Mjolsnes, "A formal analysis of ieee 802.11w deadlock vulnerabilities," in IEEE INFOCOM'12.
    • IEEE INFOCOM'12
    • Eian, M.1    Mjolsnes, S.2
  • 7
    • 51349133236 scopus 로고    scopus 로고
    • Detecting 802.11 mac layer spoofing using received signal strength
    • Y. Sheng, K. Tan, and et al., "Detecting 802.11 mac layer spoofing using received signal strength," in IEEE INFOCOM'08.
    • IEEE INFOCOM'08
    • Sheng, Y.1    Tan, K.2
  • 8
    • 84883106354 scopus 로고    scopus 로고
    • A new mac address spoofing detection algorithm using plcp header
    • P. Chumchu, T. Saelim, and C. Sriklauy, "A new mac address spoofing detection algorithm using plcp header," in IEEE ICOIN'11.
    • IEEE ICOIN'11
    • Chumchu, P.1    Saelim, T.2    Sriklauy, C.3
  • 10
    • 84883077677 scopus 로고    scopus 로고
    • Locating sensors in the forest: A case study in greenorbs
    • C. Bo and Z. e. a. Jiang, "Locating sensors in the forest: A case study in greenorbs," in IEEE INFOCOM'12.
    • IEEE INFOCOM'12
    • Bo, C.1    Jiang, Z.E.A.2
  • 14
    • 84883061710 scopus 로고    scopus 로고
    • Security analysis and improvements for IEEE 802.11 i
    • C. Mitchell, "Security analysis and improvements for ieee 802.11 i," in (NDSS'05).
    • (NDSS'05)
    • Mitchell, C.1
  • 18
    • 70349675562 scopus 로고    scopus 로고
    • Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
    • J. Yang, Y. Chen, W. Trappe, and J. Cheng, "Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks," in IEEE INFOCOM'09.
    • IEEE INFOCOM'09
    • Yang, J.1    Chen, Y.2    Trappe, W.3    Cheng, J.4
  • 20
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in ACM Mobicom'07.
    • ACM Mobicom'07
    • Patwari, N.1    Kasera, S.2
  • 25
    • 84861598237 scopus 로고    scopus 로고
    • Enhanced wireless channel authentication using time-synched link signature
    • Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in IEEE INFOCOM'12.
    • IEEE INFOCOM'12
    • Liu, Y.1    Ning, P.2
  • 27
    • 60849100947 scopus 로고    scopus 로고
    • IEEE 802.11 n Working Group and others
    • IEEE 802.11 n Working Group and others, IEEE Standard 802.11n.
    • IEEE Standard 802.11n
  • 29
    • 0034832620 scopus 로고    scopus 로고
    • Outlier detection for high dimensional data
    • C. Aggarwal and P. Yu, "Outlier detection for high dimensional data," ACM Sigmod Record, 2001.
    • (2001) ACM Sigmod Record
    • Aggarwal, C.1    Yu, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.