Proceedings of the 4th International Conference on Mobile Systems, Applications and Services 2006
DOI: 10.1145/1134680.1134682
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the security of corporate Wi-Fi networks using DAIR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
85
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(85 citation statements)
references
References 12 publications
0
85
0
Order By: Relevance
“…A passive method that a client could use for detecting the presence of fake APs was presented by Bahl et al [4]. In particular, they used the anomaly in successive sequence numbers seen in beacon frames from the real and fake APs to detect the fake AP.…”
Section: Related Workmentioning
confidence: 99%
“…A passive method that a client could use for detecting the presence of fake APs was presented by Bahl et al [4]. In particular, they used the anomaly in successive sequence numbers seen in beacon frames from the real and fake APs to detect the fake AP.…”
Section: Related Workmentioning
confidence: 99%
“…Let denote the median inter-ACK time given these samples (we use median instead of mean since it is less sensitive to outliers in the measurements [25] 4 This value is larger than that of 100-Mb/s Ethernet, which is not surprising due to the following two reasons. First, while the raw data rate of an 802.11n connection in the UConn network is up to 144 Mp/s, much lower throughput is achieved in practice (even in idealized settings, the maximum throughput of 802.11n measured in [31] is below 100 Mp/s).…”
Section: Analytical Basismentioning
confidence: 99%
“…We use an indirect approach to infer the percentage of the WLAN traffic and the belief that a flow traverses a WLAN. Most studies on WLAN management rely on distributed monitors that monitor RF airwaves [3], [4], [13], [23], [30], [37], [38]. The rationale is that RF airwave monitoring provides detailed low-level (i.e., PHY and MAC) information that is critical for analyzing the behavior of a network and troubleshooting faults in a network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach requires additional hardware for measurement, this can be viewed as a form of third-party solution. Such an approach is not new for example, DAIR [7], [8], Jigsaw [9], and Wit [10]. While these approaches provide many monitoring solutions, but do not provide any interference which is possible in the technique proposed.We are also able to detect the selfish behavior of the nodes .…”
mentioning
confidence: 99%