Detecting Impersonation Attacks in Future Wireless and Mobile Networks

Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Profiles and discuss details of our methodologies for building enhanced intrusion detection systems for future wireless and mobile networks.

[1]  M. Riezenman Cellular security: better, but foes still lurk , 2000 .

[2]  R. Filjar,et al.  Architecture of the automatic position reporting system (APRS) , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[3]  Michel Barbeau,et al.  Perfect identity concealment in UMTS over radio access links , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[4]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[5]  George L. Lyberopoulos,et al.  Evaluation of location area planning scenarios in future mobile telecommunication systems , 1995, Wirel. Networks.

[6]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[7]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[8]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[9]  Ansi Ieee,et al.  Part11 : Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications , 1999 .

[10]  Michel Barbeau,et al.  Using Mobility Profiles for Anomaly-based Intrusion Detection in Mobile Networks , 2005 .

[11]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[12]  J. Spencer Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection , 2005, Proceedings. IEEE SoutheastCon, 2005..

[13]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[14]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[15]  Carla E. Brodley,et al.  Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.

[16]  Nokia,et al.  Network Working Group Extensible Authentication Protocol Method for Gsm Subscriber Identity Modules (eap-sim) , 2004 .

[17]  Golden G. Richard,et al.  Physically Locating Wireless Intruders , 2004, ITCC.

[18]  Oktay Üreten,et al.  Bayesian detection of radio transmitter turn-on transients , 1999, NSIP.

[19]  Yuguang Fang,et al.  A new location management strategy based on user mobility pattern for wireless networks , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..

[20]  Victor C. M. Leung,et al.  Location management for next-generation personal communications networks , 2000, IEEE Netw..

[21]  Alicia Laing The Security Mechanism for IEEE 802.11 Wireless Networks , 2001 .

[22]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[23]  Andrew Hunter,et al.  Feature Selection Using Probabilistic Neural Networks , 2000, Neural Computing & Applications.

[24]  Janelle J. Harms,et al.  Profile-based protocols in wireless mobile ad hoc networks , 2001, Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks.

[25]  Refik Molva,et al.  IDAMN: An Intrusion Detection Architecture for Mobile Networks , 1997, IEEE J. Sel. Areas Commun..

[26]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[27]  Henry Haverinen,et al.  Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.

[28]  Ieee Microwave Theory,et al.  Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .

[29]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[30]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[31]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.