Lightweight MAC-Spoof Detection Exploiting Received Signal Power and Median Filtering

Davide Papini

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    446 Downloads (Pure)

    Abstract

    IEEE 802.11 networks are subject to MAC-spoof attacks. An attacker can easily steal the identity of a legitimate station, even Access Points, thus enabling him to take full control over network basic mech- anisms or even access restricted resources. In this paper we propose a method to detect this kind of attack based on signal power monitoring. The main contribution of our work is the introduction of a median l- ter that enables the detection of the attack by looking at the variance of the signal power. We take into account two types of references for the samples, time and number of frames, and compare their detection capabilities. Our experimental results show that the spoong attack is successfully detected with both type of references. Moreover the median lter helps to reject false positives.
    Original languageEnglish
    Title of host publicationProceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11)
    Publication date2011
    Publication statusPublished - 2011
    Event4th Nordic Workshop on Dependability and Security - Copenhagen, Denmark
    Duration: 22 Apr 201023 Apr 2010
    Conference number: 4

    Conference

    Conference4th Nordic Workshop on Dependability and Security
    Number4
    Country/TerritoryDenmark
    CityCopenhagen
    Period22/04/201023/04/2010

    Keywords

    • Variance
    • IEEE 802.11
    • Median lter
    • Security,Wireless LANs
    • Intrusion Detection Systems
    • Signal power
    • Spoof

    Fingerprint

    Dive into the research topics of 'Lightweight MAC-Spoof Detection Exploiting Received Signal Power and Median Filtering'. Together they form a unique fingerprint.

    Cite this