Detection of rogue devices in wireless networks

作者: Jeyanthi Hall

DOI:

关键词:

摘要: The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wide (WWAN)s. Current authentication systems are vulnerable to device impersonation by rogue devices. Within cellular mobile networks, this threat actualized cloning cell phones, using the clones obtaining free services. A well known example Fidelity (WiFi)/802.11 networks Media Access Control (MAC) address spoofing. In case, an attacker captures MAC of authorized programs it into his device, order obtain unauthorized access. spoofing equally applicable Bluetooth (BT) ad-hoc networks. The underlying problem continued use List (ACL)s, based on a single malleable identifier, e.g. addresses. Given ease with which aforementioned attacks mounted, potential impact these there requirement that capable detecting attacks. What would prove useful associate identifier less characteristics. Hence, we explore feasibility Anomaly-based Intrusion Detection (ABID), makes device-based and/or user-based profiles ad dressing problem. For example, ABID system compare multiple instances device/user characteristics, associated given those corresponding profile. Deviations from pre-established thresholds be indicative or More specifically, Radio Frequency Fingerprinting (RFF) characterizing transceivers WiFi/802.11 BT wireless cards, i.e. create profiles, Hotelling's T 2 statistics classification purposes. Similarly, also investigate adoption User Mobility Pattern (UMP)s Instance-Based Learning (IBL) technique classification. Average detection rates 93% 94.5% (WiFi/802.11) support incorporating RFF, ABID, On other hand, UMPs similar purposes technically feasible. Thus, characteristics can exploited devices

参考文章(115)
Panos Lekkas, Randall K. Nichols, Wireless Security: Models, Threats, and Solutions ,(2001)
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, Detecting rogue devices in bluetooth networks using radio frequency fingerprinting Communications and Computer Networks. pp. 108- 113 ,(2006)
Bruce Potter, Bob Fleck, 802.11 Security ,(2002)
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. communications, internet, and information technology. pp. 201- 206 ,(2004)
Peter Drabwell, Bluetooth Security — Fact or Fiction? international workshop on security. pp. 221- 228 ,(2001) , 10.1007/3-540-45807-7_32
Kaveh Pahlavan, Principles of wireless networks ,(2001)
William Stallings, Cryptography and network security ,(1998)
Cyrus Peikari, Seth Fogie, Maximum Wireless Security ,(2002)