메뉴 건너뛰기




Volumn 63, Issue 8, 2014, Pages 3927-3934

VR-defender: Self-defense against vehicular rogue APs for drive-thru internet

Author keywords

Drive thru Internet; IEEE 802.11 wireless networks; rogue access points (APs).

Indexed keywords

INTERNET; STANDARDS;

EID: 84908138355     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2014.2311015     Document Type: Article
Times cited : (14)

References (27)
  • 1
    • 84871980595 scopus 로고    scopus 로고
    • [Online] Available:
    • Drive-thru Internet. [Online]. Available: http://www.drive-thru-Internet. org/
    • Drive-thru Internet
  • 2
    • 33751055575 scopus 로고    scopus 로고
    • A measurement study of vehicular internet access using in situ Wi-Fi networks
    • Los Angeles, CA, USA, Sep.
    • V. Bychkovsky, B. Hull, A. K. Miu, H. Balakrishnan, and S. Madden, "A measurement study of vehicular internet access using in situ Wi-Fi networks," in Proc. 12th ACM MOBICOM Conf., Los Angeles, CA, USA, Sep. 2006, pp. 50-61.
    • (2006) Proc. 12th ACM MOBICOM Conf. , pp. 50-61
    • Bychkovsky, V.1    Hull, B.2    Miu, A.K.3    Balakrishnan, H.4    Madden, S.5
  • 3
    • 8344283536 scopus 로고    scopus 로고
    • Drive-thru internet: IEEE 802.11b for 'automobile' users
    • J. Ott and D. Kutscher, "Drive-thru internet: IEEE 802.11b for 'automobile' users," in Proc. IEEE INFOCOM, 2004, pp. 362-373.
    • (2004) Proc. IEEE INFOCOM , pp. 362-373
    • Ott, J.1    Kutscher, D.2
  • 4
    • 84908146456 scopus 로고    scopus 로고
    • [Online] Available
    • Google Mountain View. [Online]. Available: http://wifi.google.com
    • Google Mountain View
  • 6
    • 80053563907 scopus 로고    scopus 로고
    • A timing-based scheme for rogue AP detection, IEEE
    • Nov.
    • H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011.
    • (2011) Trans. Parallel Distrib. Syst. , vol.22 , Issue.11 , pp. 1912-1925
    • Han, H.1    Sheng, B.2    Tan, C.C.3    Li, Q.4    Lu, S.5
  • 7
    • 51349162676 scopus 로고    scopus 로고
    • A hybrid rogue access point protection framework for commodity Wi-Fi networks
    • L. Ma, A. Y. Teymorian, and X. Cheng, "A hybrid rogue access point protection framework for commodity Wi-Fi networks," in Proc. INFOCOM, 2008, pp. 1894-1902.
    • (2008) Proc. INFOCOM , pp. 1894-1902
    • Ma, L.1    Teymorian, A.Y.2    Cheng, X.3
  • 8
    • 42149159995 scopus 로고    scopus 로고
    • Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
    • W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs," in Proc. IMC, 2007, pp. 365-378.
    • (2007) Proc. IMC , pp. 365-378
    • Wei, W.1    Suh, K.2    Wang, B.3    Gu, Y.4    Kurose, J.5    Towsley, D.6
  • 9
    • 84885892757 scopus 로고    scopus 로고
    • Rogue access point detection using innate characteristics of the 802.11 MAC
    • A. Venkataraman and R. Beyah, "Rogue access point detection using innate characteristics of the 802.11 MAC," in Proc. SecureComm, 2009, pp. 394-416.
    • (2009) Proc. SecureComm , pp. 394-416
    • Venkataraman, A.1    Beyah, R.2
  • 10
    • 51249109756 scopus 로고    scopus 로고
    • Detecting protected layer-3 rogue APs
    • H. Yin, G. Chen, and J. Wang, "Detecting protected layer-3 rogue APs," in Proc. BROADNETS, 2007, pp. 449-458.
    • (2007) Proc. BROADNETS , pp. 449-458
    • Yin, H.1    Chen, G.2    Wang, J.3
  • 11
    • 11244291937 scopus 로고    scopus 로고
    • Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
    • A. Adya, P. Bahl, R. Chandra, and L. Qiu, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks," in Proc. MOBICOM, 2004, pp. 30-44.
    • (2004) Proc. MOBICOM , pp. 30-44
    • Adya, A.1    Bahl, P.2    Chandra, R.3    Qiu, L.4
  • 12
    • 39349101259 scopus 로고    scopus 로고
    • A passive approach to rogue access point detection
    • L.Watkins, R. Beyah, and C. Corbett, "A passive approach to rogue access point detection," in Proc. IEEE GLOBECOM, 2007, pp. 355-360.
    • (2007) Proc IEEE GLOBECOM , pp. 355-360
    • Watkins, L.1    Beyah, R.2    Corbett, C.3
  • 13
    • 18144401989 scopus 로고    scopus 로고
    • Rogue access point detection using temporal traffic characteristics
    • R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Proc. GLOBECOM, 2004, pp. 2271-2275.
    • (2004) Proc. GLOBECOM , pp. 2271-2275
    • Beyah, R.1    Kangude, S.2    Yu, G.3    Strickland, B.4    Copeland, J.5
  • 15
    • 47949122729 scopus 로고    scopus 로고
    • Rogue access point detection by analyzing network traffic characteristics
    • S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in Proc. IEEEMILCOM, 2007, pp. 1-7.
    • (2007) Proc. IEEEMILCOM , pp. 1-7
    • Shetty, S.1    Song, M.2    Ma, L.3
  • 16
    • 57349195538 scopus 로고    scopus 로고
    • Supporting vehicular mobility in urban multi-hop wireless networks
    • A. Giannoulis, M. Fiore, and E. W. Knightly, "Supporting vehicular mobility in urban multi-hop wireless networks," in Proc. MobiSys, 2008, pp. 54-66.
    • (2008) Proc. MobiSys , pp. 54-66
    • Giannoulis, A.1    Fiore, M.2    Knightly, E.W.3
  • 17
    • 70349711763 scopus 로고    scopus 로고
    • [Online]. Available
    • Air defence. [Online]. Available: http://www.airdefense.net
    • Air Defence
  • 18
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized wireless access points using clock skews
    • S. Jana and S. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," in Proc. MOBICOM, 2008, pp. 104-115.
    • (2008) Proc. MOBICOM , pp. 104-115
    • Jana, S.1    Kasera, S.2
  • 19
    • 51349133236 scopus 로고    scopus 로고
    • Detecting 802.11 MAC layer spoofing using received signal strength
    • Y. Sheng, K. Tan, G. Chen, and D. Kotz, "Detecting 802.11 MAC layer spoofing using received signal strength," in Proc. IEEE INFOCOM, 2008, pp. 2441-2449.
    • (2008) Proc IEEE INFOCOM , pp. 2441-2449
    • Sheng, Y.1    Tan, K.2    Chen, G.3    Kotz, D.4
  • 20
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proc. MOBICOM, 2008, pp. 116-127.
    • (2008) Proc. MOBICOM , pp. 116-127
    • Brik, V.1    Banerjee, S.2    Gruteser, M.3    Oh, S.4
  • 21
    • 84887958680 scopus 로고    scopus 로고
    • Novel packet sizebased covert channel attacks against anonymizer
    • Dec.
    • Z. Ling, X. Fu, W. Jia, W. Yu, D. Xuan, and J. Luo, "Novel packet sizebased covert channel attacks against anonymizer," IEEE Trans. Comput., vol. 62, no. 12, pp. 2411-2426, Dec. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.12 , pp. 2411-2426
    • Ling, Z.1    Fu, X.2    Jia, W.3    Yu, W.4    Xuan, D.5    Luo, J.6
  • 24
    • 80052807722 scopus 로고    scopus 로고
    • Characterizing WIFI link performance in open outdoor networks
    • U. Paul, R. Crepaldi, J. Lee, S.-J. Lee, and R. H. Etkin, "Characterizing WIFI link performance in open outdoor networks," in Proc. SECON, 2011, pp. 251-259.
    • (2011) Proc. SECON , pp. 251-259
    • Paul, U.1    Crepaldi, R.2    Lee, J.3    Lee, S.-J.4    Etkin, R.H.5
  • 26
    • 84908132834 scopus 로고    scopus 로고
    • [Online]. Available
    • Deliberant CPE 2-12. [Online]. Available: http://www.streakwave.com/mmSWAVE1/Video/CPE%202-12.pdf
    • Deliberant CPE , pp. 2-12
  • 27
    • 84908132833 scopus 로고    scopus 로고
    • Openwrt. [Online]. Available
    • Openwrt. [Online]. Available: https://openwrt.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.