Locating Rogue Access Point Using Fine-Grained Channel Information
نویسندگان
چکیده
منابع مشابه
Rogue Access Point Detection Using Time Stamp
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
متن کاملFine-Grained Access Control for EPC Information Services
Inter-organizational exchange of information about physical objects that is automatically gathered using RFID can increase the traceability of goods in complex supply chains. With the EPCIS speci cation, a standard for RFID-based events and respective information system interfaces is available. However, it does not address access control in detail, which is a prerequisite for secure information...
متن کاملFine-grained Access Control using Email Social Network
We introduce the idea of applying social network analysis to organizational access control. With current access control systems, users are typically assigned access to many more resources than they need and permissions are rarely updated. We propose to refine these access policies using the dynamic social network defined by intra-organizational emails. Email social networks within organizations...
متن کاملFine-grained integration of access control policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the finegrained integration requirements that the various parties may have. In this paper, we introduce an algebra for fine-grained i...
متن کاملOn Fine-Grained Access Control for XML
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2017
ISSN: 1536-1233,1558-0660,2161-9875
DOI: 10.1109/tmc.2016.2629473