Title :
PHY-Authentication Protocol for Spoofing Detection in Wireless Networks
Author :
Xiao, Liang ; Reznik, Alex ; Trappe, Wade ; Ye, Chunxuan ; Shah, Yogendra ; Greenstein, Larry ; Mandayam, Narayan
Author_Institution :
Dept. of Commun. Eng., Xiamen Univ., Xiamen, China
Abstract :
We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing-either simple or advanced-higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for ``naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.
Keywords :
channel estimation; computer network security; message authentication; protocols; wireless LAN; wireless channels; IEEE 802.11i; PHY-authentication protocol; channel estimation; higher-layer process; naked wireless system; radio channel; rapid-decorrelation property; sensor network; spoofing attack detection; wireless network; Authentication; Channel estimation; IEEE 802.11 Standards; Protocols; Wireless networks;
Conference_Titel :
Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE
Conference_Location :
Miami, FL
Print_ISBN :
978-1-4244-5636-9
Electronic_ISBN :
1930-529X
DOI :
10.1109/GLOCOM.2010.5683463