메뉴 건너뛰기




Volumn , Issue , 2013, Pages 441-452

Securearray: Improving WiFi security with fine-grained physical-layer information

Author keywords

802.11; Antenna array system; Aoa signature; Secureangle; Securearray; Security; Wireless

Indexed keywords

802.11; ANTENNA ARRAY SYSTEM; AOA SIGNATURE; SECUREANGLE; SECUREARRAY; SECURITY;

EID: 84887106886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2500423.2500444     Document Type: Conference Paper
Times cited : (133)

References (41)
  • 1
    • 11144304214 scopus 로고    scopus 로고
    • IEEE Standard 802.11i-2004, June
    • IEEE Standard 802.11i-2004: MAC Security Enhancements, June 2004.
    • (2004) MAC Security Enhancements
  • 2
    • 78650910787 scopus 로고    scopus 로고
    • IEEE Standard 802.11w-2009, Sept.
    • IEEE Standard 802.11w-2009: Protected Management Frames, Sept. 2009.
    • (2009) Protected Management Frames
  • 4
    • 80051903947 scopus 로고    scopus 로고
    • Short paper: Security evaluation of IEEE 802.11w specification
    • M. Ahmad and S. Tadakamadla. Short paper: security evaluation of IEEE 802.11w specification. In Proceedings of ACM WiSec, 2011.
    • (2011) Proceedings of ACM WiSec
    • Ahmad, M.1    Tadakamadla, S.2
  • 5
    • 84861601547 scopus 로고    scopus 로고
    • STROBE: Actively securing wireless communications using zero-forcing beamforming
    • N. Anand, S. Lee, and E. Knightly. STROBE: Actively securing wireless communications using zero-forcing beamforming. In Proc. of IEEE Infocom, 2012.
    • (2012) Proc. of IEEE Infocom
    • Anand, N.1    Lee, S.2    Knightly, E.3
  • 6
    • 78649307719 scopus 로고    scopus 로고
    • Design and experimental evaluation of multi-user beamforming in wireless LANS
    • E. Aryafar, N. Anand, T. Salonidis, and E. Knightly. Design and experimental evaluation of multi-user beamforming in wireless LANs. In Proc. of ACM MobiCom, 2010.
    • (2010) Proc. of ACM MobiCom
    • Aryafar, E.1    Anand, N.2    Salonidis, T.3    Knightly, E.4
  • 8
    • 70349147400 scopus 로고    scopus 로고
    • Practical attacks against WEP and WPA
    • M. Beck and E. Tews. Practical attacks against WEP and WPA. In Proc. of ACM WiSec, pages 79-86, 2009.
    • (2009) Proc. of ACM WiSec , pp. 79-86
    • Beck, M.1    Tews, E.2
  • 9
    • 84887054893 scopus 로고    scopus 로고
    • 802.11W security: DOS attacks and vulnerability controls
    • B. Bertka. 802.11w security: DoS attacks and vulnerability controls. In Proc. of Infocom, 2012.
    • (2012) Proc. of Infocom
    • Bertka, B.1
  • 13
    • 81055155451 scopus 로고    scopus 로고
    • The modeling and comparison of wireless network denial of service attacks
    • M. Eian and S. Mjølsnes. The modeling and comparison of wireless network denial of service attacks. In Proc. of ACM MobiHeld, 2011.
    • (2011) Proc. of ACM MobiHeld
    • Eian, M.1    Mjølsnes, S.2
  • 14
    • 84861639032 scopus 로고    scopus 로고
    • A formal analysis of IEEE 802.11w deadlock vulnerabilities
    • M. Eian and S. Mjølsnes. A formal analysis of IEEE 802.11w deadlock vulnerabilities. In Proc. of IEEE Infocom, 2012.
    • (2012) Proc. of IEEE Infocom
    • Eian, M.1    Mjølsnes, S.2
  • 15
    • 34548342490 scopus 로고    scopus 로고
    • No long-term secrets: Location based security in overprovisioned wireless LANS
    • D. Faria and D. Cheriton. No long-term secrets: Location based security in overprovisioned wireless LANs. In Proc. of ACM HotNets, 2004.
    • (2004) Proc. of ACM HotNets
    • Faria, D.1    Cheriton, D.2
  • 16
    • 84856542731 scopus 로고    scopus 로고
    • Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
    • D. Faria and D. Cheriton. Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints. In Proc. of ACM WiSe, 2006.
    • (2006) Proc. of ACM WiSe
    • Faria, D.1    Cheriton, D.2
  • 17
    • 69249113549 scopus 로고    scopus 로고
    • Zigzag decoding: Combating hidden terminals in wireless networks
    • S. Gollakota and D. Katabi. Zigzag decoding: Combating hidden terminals in wireless networks. In Proc. of ACM SIGCOMM, 2008.
    • (2008) Proc. of ACM SIGCOMM
    • Gollakota, S.1    Katabi, D.2
  • 20
    • 1642314732 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. In Proc. of ACM WMASH, 2003.
    • (2003) Proc. of ACM WMASH
    • Gruteser, M.1    Grunwald, D.2
  • 21
    • 79551483702 scopus 로고    scopus 로고
    • Tool release: Gathering 802.11n traces with channel state information
    • Jan.
    • D. Halperin, W. Hu, A. Sheth, and D. Wetherall. Tool release: Gathering 802.11n traces with channel state information. SIGCOMM CCR, 41(1):53, Jan. 2011.
    • (2011) SIGCOMM CCR , vol.41 , Issue.1 , pp. 53
    • Halperin, D.1    Hu, W.2    Sheth, A.3    Wetherall, D.4
  • 22
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • G. Holzmann. The model checker SPIN. IEEE Trans. Software Eng., 23(5):279-295, 1997.
    • (1997) IEEE Trans. Software Eng. , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.1
  • 23
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized wireless access points using clock skews
    • S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. In Proceedings of ACM MobiCom, 2008.
    • (2008) Proceedings of ACM MobiCom
    • Jana, S.1    Kasera, S.K.2
  • 24
    • 84883094081 scopus 로고    scopus 로고
    • Rejecting the attack: Source authentication for Wi-Fi management frames using CSI information
    • Z. Jiang, J. Zhao, X. Li, J. Han, and W. Xi. Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information. In Proc. of IEEE Infocom, 2013.
    • (2013) Proc. of IEEE Infocom
    • Jiang, Z.1    Zhao, J.2    Li, X.3    Han, J.4    Xi, W.5
  • 26
    • 56749098358 scopus 로고    scopus 로고
    • Identifying unique devices through wireless fingerprinting
    • Mar.
    • D. C. Loh, C. Y. Cho, C. P. Tan, and R. S. Lee. Identifying unique devices through wireless fingerprinting. In Proc. of the ACM WiSec Conf., pages 46-55, Mar. 2008.
    • (2008) Proc. of the ACM WiSec Conf. , pp. 46-55
    • Loh, D.C.1    Cho, C.Y.2    Tan, C.P.3    Lee, R.S.4
  • 29
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • Sept.
    • N. Patwari and S. Kasera. Robust location distinction using temporal link signatures. In Proc. of the ACM MobiCom Conf., pages 111-122, Sept. 2007.
    • (2007) Proc. of the ACM MobiCom Conf. , pp. 111-122
    • Patwari, N.1    Kasera, S.2
  • 30
    • 0022683359 scopus 로고
    • Multiple emitter location and signal parameter estimation
    • Mar.
    • R. Schmidt. Multiple emitter location and signal parameter estimation. IEEE Trans. on Antennas and Propagation, 34(3):276-280, Mar. 1986.
    • (1986) IEEE Trans. on Antennas and Propagation , vol.34 , Issue.3 , pp. 276-280
    • Schmidt, R.1
  • 33
    • 54849406264 scopus 로고    scopus 로고
    • Detecting 802.11 MAC layer spoofing using received signal strength
    • Apr.
    • Y. Sheng, G. Chen, D. Kotz, and A. Campbell. Detecting 802.11 MAC layer spoofing using received signal strength. In Proc. of IEEE Infocom, pages 1768-1776, Apr. 2008.
    • (2008) Proc. of IEEE Infocom , pp. 1768-1776
    • Sheng, Y.1    Chen, G.2    Kotz, D.3    Campbell, A.4
  • 38
    • 84865566718 scopus 로고    scopus 로고
    • Secureangle: Improving wireless security using angle-of-arrival signatures
    • J. Xiong and K. Jamieson. SecureAngle: Improving wireless security using angle-of-arrival signatures. In Proc. of ACM HotNets, 2010.
    • (2010) Proc. of ACM HotNets
    • Xiong, J.1    Jamieson, K.2
  • 39
    • 85076686625 scopus 로고    scopus 로고
    • Array Track: A fine-grained indoor location system
    • J. Xiong and K. Jamieson. ArrayTrack: A Fine-Grained Indoor Location System. In Proc. of NSDI, 2013.
    • (2013) Proc. of NSDI
    • Xiong, J.1    Jamieson, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.