Using Radio Device Fingerprinting for the Detection of Impersonation and Sybil Attacks in Wireless Networks

作者: Bartlomiej Sieka

DOI: 10.1007/11964254_16

关键词:

摘要: This paper describes an intrusion detection system to identify impersonation attacks and Sybil in wireless networks. The uses radio device fingerprinting has experimental performance comparable with existing methods. systems for have not been widely investigated date, this contribution of the is novel. also derives analytical formulae relating metrics classification procedure system. can be used guide selection method, knowing desired use simplifies task securing a ad-hoc network.

参考文章(23)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Nur Serinken, Oktay Ureten, Bayesian detection of radio transmitter turn-on transients. NSIP. pp. 830- 834 ,(1999)
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. communications, internet, and information technology. pp. 201- 206 ,(2004)
Michel Barbeau, Jyanthi Hall, Evangelos Kranakis, Detecting impersonation attacks in future wireless and mobile networks ad hoc networks. pp. 80- 95 ,(2005) , 10.1007/11801412_8
J. Hall, M. Barbeau, E. Kranakis, Anomaly-based intrusion detection using mobility profiles of public transportation users wireless and mobile computing, networking and communications. ,vol. 2, pp. 17- 24 ,(2005) , 10.1109/WIMOB.2005.1512845
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE ,(2003)
Yongguang Zhang, Wenke Lee, Yi-An Huang, Intrusion detection techniques for mobile wireless networks Wireless Networks. ,vol. 9, pp. 545- 556 ,(2003) , 10.1023/A:1024600519144
B. Sieka, Active fingerprinting of 802.11 devices by timing analysis consumer communications and networking conference. ,vol. 1, pp. 15- 19 ,(2006) , 10.1109/CCNC.2006.1592979
Eugene H. Spafford, Sandeep Kumar, A Software Architecture to Support Misuse Intrusion Detection ,(1995)