Boomerang: Acoustic Fingerprinting for Network Access Control
نویسندگان
چکیده
As the prevalence of wireless networking has increased, so has the need for easy-to-use methods of securing wireless networks from abuse by unauthorized users. This paper introduces the distinction between the wireless coverage area of an access point, and the wireless service area, over which a network operator wishes to provide wireless service. This paper also presents Boomerang, a system that allows network owners to define the wireless service area through acoustic fingerprinting techniques. Boomerang’s design is unique in that it restricts wireless network access to clients that are within acoustic range of the access point, which is a desirable feature in settings such as coffee shops and apartments. Further, Boomerang can be used in conjunction with existing access control methods such as WPA and WEP to provide further access restriction and confidential communication between clients and the access point.
منابع مشابه
Decaying neutrino and a high cosmological baryon density
The low second acoustic peak in the recent Boomerang data may indicate a cosmological baryon density which is larger than allowed by standard big bang nucleosynthesis. We show that the decay of the tau-neutrino: ντ → νe +φ, where νe is the electron neutrino and φ is a scalar, essentially can assure agreement between BBN calculations and light element observations for a large baryon density.
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملIEEE 802.11 user fingerprinting and its applications for intrusion detection
Easy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analys...
متن کاملEnhancing intrusion detection in wireless networks using radio frequency fingerprinting
Media access control (MAC) address spoofing can result in the unauthorized use of network resources. This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion detection system (IDS), for detecting this attack. RFF is a technique that is used to uniquely identify a transceiver based on the transient portion of the signal it genera...
متن کاملAudio Fingerprinting: Concepts And Applications
An audio fingerprint is a compact digest derived from perceptually relevant aspects of a recording. Fingerprinting technologies allow the monitoring of audio content without the need of meta-data or watermark embedding. However, additional uses exist for audio fingerprinting and some are reviewed in this article.
متن کامل