PHY-authentication protocol for spoofing detection in wireless networks

Liang Xiao, Alex Reznik, Wade Trappe, Chunxuan Ye, Yogendra Shah, Larry Greenstein, Narayan Mandayam

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Abstract

We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing - either simple or advanced - higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for "naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.

Original languageEnglish (US)
Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
DOIs
StatePublished - Dec 1 2010
Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
Duration: Dec 6 2010Dec 10 2010

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other53rd IEEE Global Communications Conference, GLOBECOM 2010
CountryUnited States
CityMiami, FL
Period12/6/1012/10/10

Fingerprint

Authentication
Wireless networks
Network protocols
Office buildings
Channel estimation
Testbeds
Sensor networks

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

Xiao, L., Reznik, A., Trappe, W., Ye, C., Shah, Y., Greenstein, L., & Mandayam, N. (2010). PHY-authentication protocol for spoofing detection in wireless networks. In 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010 [5683463] (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2010.5683463
Xiao, Liang ; Reznik, Alex ; Trappe, Wade ; Ye, Chunxuan ; Shah, Yogendra ; Greenstein, Larry ; Mandayam, Narayan. / PHY-authentication protocol for spoofing detection in wireless networks. 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. (GLOBECOM - IEEE Global Telecommunications Conference).
@inproceedings{1002adc72cb74b87804c58e0760bdf61,
title = "PHY-authentication protocol for spoofing detection in wireless networks",
abstract = "We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing - either simple or advanced - higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for {"}naked{"} wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.",
author = "Liang Xiao and Alex Reznik and Wade Trappe and Chunxuan Ye and Yogendra Shah and Larry Greenstein and Narayan Mandayam",
year = "2010",
month = "12",
day = "1",
doi = "10.1109/GLOCOM.2010.5683463",
language = "English (US)",
isbn = "9781424456383",
series = "GLOBECOM - IEEE Global Telecommunications Conference",
booktitle = "2010 IEEE Global Telecommunications Conference, GLOBECOM 2010",

}

Xiao, L, Reznik, A, Trappe, W, Ye, C, Shah, Y, Greenstein, L & Mandayam, N 2010, PHY-authentication protocol for spoofing detection in wireless networks. in 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010., 5683463, GLOBECOM - IEEE Global Telecommunications Conference, 53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United States, 12/6/10. https://doi.org/10.1109/GLOCOM.2010.5683463

PHY-authentication protocol for spoofing detection in wireless networks. / Xiao, Liang; Reznik, Alex; Trappe, Wade; Ye, Chunxuan; Shah, Yogendra; Greenstein, Larry; Mandayam, Narayan.

2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. 5683463 (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - PHY-authentication protocol for spoofing detection in wireless networks

AU - Xiao, Liang

AU - Reznik, Alex

AU - Trappe, Wade

AU - Ye, Chunxuan

AU - Shah, Yogendra

AU - Greenstein, Larry

AU - Mandayam, Narayan

PY - 2010/12/1

Y1 - 2010/12/1

N2 - We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing - either simple or advanced - higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for "naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.

AB - We propose a PHY-authentication protocol to detect spoofing attacks in wireless networks, exploiting the rapid-decorrelation property of radio channels with distance. In this protocol, a PHY-authentication scheme that exploits channel estimations that already exist in most wireless systems, cooperates with any existing - either simple or advanced - higher-layer process, such as IEEE 802.11i. With little additional system overhead, our scheme reduces the workload of the higher-layer process, or provides some degree of spoofing protection for "naked" wireless systems, such as some sensor networks. We describe the performance of our approach as a function of the spoofing pattern and the snapshot performance that can be easily measured through field tests. We discuss the implementation issues of the authentication protocol on 802.11 testbeds and verify its performance via field tests in a typical office building.

UR - http://www.scopus.com/inward/record.url?scp=79551640226&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79551640226&partnerID=8YFLogxK

U2 - 10.1109/GLOCOM.2010.5683463

DO - 10.1109/GLOCOM.2010.5683463

M3 - Conference contribution

AN - SCOPUS:79551640226

SN - 9781424456383

T3 - GLOBECOM - IEEE Global Telecommunications Conference

BT - 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010

ER -

Xiao L, Reznik A, Trappe W, Ye C, Shah Y, Greenstein L et al. PHY-authentication protocol for spoofing detection in wireless networks. In 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 2010. 5683463. (GLOBECOM - IEEE Global Telecommunications Conference). https://doi.org/10.1109/GLOCOM.2010.5683463