Solution to the wireless evil-twin transmitter attack
暂无分享,去创建一个
Michel Barbeau | Christine Laurendeau | Payal Bhatia | M. Barbeau | Christine Laurendeau | P. Bhatia
[1] Jie Yang,et al. Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks , 2009, IEEE INFOCOM 2009.
[2] Volker Roth,et al. Simple and effective defense against evil twin access points , 2008, WiSec '08.
[3] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[4] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[6] Lorne Christopher Liechty,et al. Path Loss Measurements and Model Analysis of a 2.4 GHz Wireless Network in an Outdoor Environment , 2007 .
[7] Bo Sheng,et al. A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.
[8] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] H.T. Friis,et al. A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.
[10] Michel Barbeau,et al. Insider attack attribution using signal strength-based hyperbolic location estimation , 2008, Secur. Commun. Networks.
[11] Lorne Liechty,et al. Developing the Best 2.4 GHz Propagation Model from Active Network Measurements , 2007, 2007 IEEE 66th Vehicular Technology Conference.