Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints
2013 (English)In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ISSN 1867-8211, Vol. 114, 283-301 p.Article in journal (Refereed) Published
Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then uses the still whitelisted MAC address for the network access. We propose and experiment with “implementation fingerprints” that can be used to detect MAC layer spoofing in this setting. We include eight different tests in the detection algorithm, resulting in 2.8 in average Hamming distance of the tests. Eleven different STA devices are tested with promising detection results. No precomputed database of fingerprints is needed.
Place, publisher, year, edition, pages
Springer, 2013. Vol. 114, 283-301 p.
IdentifiersURN: urn:nbn:no:ntnu:diva-23260DOI: 10.1007/978-3-642-39891-9_18OAI: oai:DiVA.org:ntnu-23260DiVA: diva2:659971