Combating wireless LAN MAC-layer address spoofing with fingerprinting methods

ISSN: 1816353X
13Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

Unwanted use of wireless networks has become a well-known problem in recent years. One attempt to solve this problem is the use of access control lists, which are asso-ciated with accredited MAC addresses. But since MAC addresses can be spoofed very easily, improved mecha-nisms are needed to attest the uniqueness of a dedicated wireless station. Today, all known approaches are based on the idea to generate NIC-specific profiles derived from invariant NIC-characteristics. In doing so, unique fea-tures are either extracted from RF-components or from the timing behavior of the MAC-chip. To give a review and to classify all proposed approaches, we start with a short introduction to all underlying ideas and will con-clude with a comparison of these mechanisms.

Cite

CITATION STYLE

APA

Lackner, G., Payer, U., & Teufl, P. (2009). Combating wireless LAN MAC-layer address spoofing with fingerprinting methods. International Journal of Network Security, 9(2), 164–172.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free