{"title":"使用独特的设备和链路特性保护无线网络","authors":"S. Kasera","doi":"10.1145/2185216.2185305","DOIUrl":null,"url":null,"abstract":"We explore the use of unique device characteristics that we call fingerprints, and unique wireless link characteristics that we call link signatures, for enhancing wireless network security. Our fingerprinting research complements the traditional password and certificate methods for authenticating and identifying devices. Specifically, we show how the clock skew of an access point can be used as its fingerprint to detect unauthorized access points in wireless local area networks quickly and accurately.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing wireless networks using unique device and link characteristics\",\"authors\":\"S. Kasera\",\"doi\":\"10.1145/2185216.2185305\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We explore the use of unique device characteristics that we call fingerprints, and unique wireless link characteristics that we call link signatures, for enhancing wireless network security. Our fingerprinting research complements the traditional password and certificate methods for authenticating and identifying devices. Specifically, we show how the clock skew of an access point can be used as its fingerprint to detect unauthorized access points in wireless local area networks quickly and accurately.\",\"PeriodicalId\":180836,\"journal\":{\"name\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2185216.2185305\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Wireless Technologies for Humanitarian Relief","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2185216.2185305","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing wireless networks using unique device and link characteristics
We explore the use of unique device characteristics that we call fingerprints, and unique wireless link characteristics that we call link signatures, for enhancing wireless network security. Our fingerprinting research complements the traditional password and certificate methods for authenticating and identifying devices. Specifically, we show how the clock skew of an access point can be used as its fingerprint to detect unauthorized access points in wireless local area networks quickly and accurately.