SecureAngle

  • Xiong J
  • Jamieson K
N/ACitations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless local area networks play an important role in our everyday lives, at the workplace and at home. However, wireless networks are also relatively vulnerable: physically located off-premises, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a security risk to the entire network. To address this problem, we propose SecureAngle , a system designed to operate alongside existing wireless security protocols, adding defense in depth. SecureAngle employs multiantenna APs to profile the directions at which a client's signal arrives, using this angle-of-arrival information to construct unique signatures that identify each client. With these signatures, we are currently investigating how a SecureAngle enabled AP can enable a "virtual fence" that drops frames injected into the network from a client physically located outside a building, and how a SecureAngle-enabled AP can prevent malicious parties from spoofing the link-layer address of legitimate clients.

Cite

CITATION STYLE

APA

Xiong, J., & Jamieson, K. (2010). SecureAngle. ACM SIGCOMM Computer Communication Review, 40(4), 415–416. https://doi.org/10.1145/1851275.1851238

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free