Publication | Closed Access
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks
45
Citations
9
References
2010
Year
Unknown Venue
Hardware SecurityEngineeringIeee 802.11IWireless SecurityInformation SecurityPhy-authentication SchemeWireless LanAuthenticationSecure CommunicationPhy-authentication ProtocolMobile ComputingComputer ScienceWireless ComputingWireless SystemsAuthentication ProtocolData SecurityCryptography
We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing-either simple or advanced-higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for ``naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.
| Year | Citations | |
|---|---|---|
Page 1
Page 1