DocumentCode :
1987430
Title :
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks
Author :
Xiao, Liang ; Reznik, Alex ; Trappe, Wade ; Ye, Chunxuan ; Shah, Yogendra ; Greenstein, Larry ; Mandayam, Narayan
Author_Institution :
Dept. of Commun. Eng., Xiamen Univ., Xiamen, China
fYear :
2010
fDate :
6-10 Dec. 2010
Firstpage :
1
Lastpage :
6
Abstract :
We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing-either simple or advanced-higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for ``naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.
Keywords :
channel estimation; computer network security; message authentication; protocols; wireless LAN; wireless channels; IEEE 802.11i; PHY-authentication protocol; channel estimation; higher-layer process; naked wireless system; radio channel; rapid-decorrelation property; sensor network; spoofing attack detection; wireless network; Authentication; Channel estimation; IEEE 802.11 Standards; Protocols; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location :
Miami, FL
ISSN :
1930-529X
Print_ISBN :
978-1-4244-5636-9
Electronic_ISBN :
1930-529X
Type :
conf
DOI :
10.1109/GLOCOM.2010.5683463
Filename :
5683463
Link To Document :
بازگشت