Lightweight MAC-spoof detection exploiting received signal power and median filtering
by Davide Papini
International Journal of Critical Computer-Based Systems (IJCCBS), Vol. 3, No. 4, 2012

Abstract: IEEE 802.11 networks are subject to MAC-spoof attacks. With this an attacker can steal the identity of a legitimate station, even access points, enabling him to take full control over network basic mechanisms and possibly access restricted resources. In this paper, we propose a new method to detect this, based on signal power monitoring. The main contribution of our work is the introduction of a median filter that enables the detection of the attack by looking at the variance of the signal power. We take into account two types of references for the samples: 1) time; 2) number of frames, and compare their detection capabilities. Our experimental results show that the spoofing attack is successfully detected with both types of references. Moreover the median filter helps to reject false positives.

Online publication date: Sat, 16-Aug-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Critical Computer-Based Systems (IJCCBS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com