2012
DOI: 10.1504/ijccbs.2012.053204
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight MAC-spoof detection exploiting received signal power and median filtering

Abstract: Abstract. IEEE 802.11 networks are subject to MAC-spoof attacks. An attacker can easily steal the identity of a legitimate station, even Access Points, thus enabling him to take full control over network basic mechanisms or even access restricted resources. In this paper we propose a method to detect this kind of attack based on signal power monitoring. The main contribution of our work is the introduction of a median filter that enables the detection of the attack by looking at the variance of the signal powe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Several works have been proposed to separate the RSS sequences in order to detect the spoofing attack. The mechanisms include median filtering [10], normalization technique [11], Pearson correlation coefficient [12], Kmeans clustering [3,4] and K-medoids clustering [5]. In this work, we propose a client-centric AP spoofing detection framework by adapting the work undertaken in [3,4,5].…”
Section: Related Workmentioning
confidence: 99%
“…Several works have been proposed to separate the RSS sequences in order to detect the spoofing attack. The mechanisms include median filtering [10], normalization technique [11], Pearson correlation coefficient [12], Kmeans clustering [3,4] and K-medoids clustering [5]. In this work, we propose a client-centric AP spoofing detection framework by adapting the work undertaken in [3,4,5].…”
Section: Related Workmentioning
confidence: 99%