Boomerang: Acoustic Fingerprinting for Network Access Control

نویسندگان

  • Peter Hornyack
  • Nicholas Hunt
چکیده

As the prevalence of wireless networking has increased, so has the need for easy-to-use methods of securing wireless networks from abuse by unauthorized users. This paper introduces the distinction between the wireless coverage area of an access point, and the wireless service area, over which a network operator wishes to provide wireless service. This paper also presents Boomerang, a system that allows network owners to define the wireless service area through acoustic fingerprinting techniques. Boomerang’s design is unique in that it restricts wireless network access to clients that are within acoustic range of the access point, which is a desirable feature in settings such as coffee shops and apartments. Further, Boomerang can be used in conjunction with existing access control methods such as WPA and WEP to provide further access restriction and confidential communication between clients and the access point.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decaying neutrino and a high cosmological baryon density

The low second acoustic peak in the recent Boomerang data may indicate a cosmological baryon density which is larger than allowed by standard big bang nucleosynthesis. We show that the decay of the tau-neutrino: ντ → νe +φ, where νe is the electron neutrino and φ is a scalar, essentially can assure agreement between BBN calculations and light element observations for a large baryon density.

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

IEEE 802.11 user fingerprinting and its applications for intrusion detection

Easy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analys...

متن کامل

Enhancing intrusion detection in wireless networks using radio frequency fingerprinting

Media access control (MAC) address spoofing can result in the unauthorized use of network resources. This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion detection system (IDS), for detecting this attack. RFF is a technique that is used to uniquely identify a transceiver based on the transient portion of the signal it genera...

متن کامل

Audio Fingerprinting: Concepts And Applications

An audio fingerprint is a compact digest derived from perceptually relevant aspects of a recording. Fingerprinting technologies allow the monitoring of audio content without the need of meta-data or watermark embedding. However, additional uses exist for audio fingerprinting and some are reviewed in this article.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010