348 research outputs found

    IEEE 802.11 i Security and Vulnerabilities

    Get PDF
    Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (RSNs) remain vulnerable to a number of attacks. Failure of preventive measures to address all RSN vulnerabilities dictates the need for enhancing the performance of Wireless Intrusion Detection Systems (WIDSs) to detect all attacks on RSNs with less false positive and false negative rates

    Empirical Techniques To Detect Rogue Wireless Devices

    Get PDF
    Media Access Control (MAC) addresses in wireless networks can be trivially spoofed using off-the-shelf devices. We proposed a solution to detect MAC address spoofing in wireless networks using a hard-to-spoof measurement that is correlated to the location of the wireless device, namely the Received Signal Strength (RSS). We developed a passive solution that does not require modification for standards or protocols. The solution was tested in a live test-bed (i.e., a Wireless Local Area Network with the aid of two air monitors acting as sensors) and achieved 99.77%, 93.16%, and 88.38% accuracy when the attacker is 8–13 m, 4–8 m, and less than 4 m away from the victim device, respectively. We implemented three previous methods on the same test-bed and found that our solution outperforms existing solutions. Our solution is based on an ensemble method known as Random Forests. We also proposed an anomaly detection solution to deal with situations where it is impossible to cover the whole intended area. The solution is totally passive and unsupervised (using unlabeled data points) to build the profile of the legitimate device. It only requires the training of one location which is the location of the legitimate device (unlike the misuse detection solution that train and simulate the existing of the attacker in every possible spot in the network diameter). The solution was tested in the same test-bed and yield about 79% overall accuracy. We build a misuseWireless Local Area Network Intrusion Detection System (WIDS) and discover some important fields in WLAN MAC-layer frame to differentiate the attackers from the legitimate devices. We tested several machine learning algorithms and found some promising ones to improve the accuracy and computation time on a public dataset. The best performing algorithms that we found are Extra Trees, Random Forests, and Bagging. We then used a majority voting technique to vote on these algorithms. Bagging classifier and our customized voting technique have good results (about 96.25 % and 96.32 %respectively) when tested on all the features. We also used a data mining technique based on Extra Trees ensemble method to find the most important features on AWID public dataset. After selecting the most 20 important features, Extra Trees and our voting technique are the best performing classifiers in term of accuracy (96.31 % and 96.32 % respectively)

    Design of Indoor Positioning Systems Based on Location Fingerprinting Technique

    Get PDF
    Positioning systems enable location-awareness for mobile computers in ubiquitous and pervasive wireless computing. By utilizing location information, location-aware computers can render location-based services possible for mobile users. Indoor positioning systems based on location fingerprints of wireless local area networks have been suggested as a viable solution where the global positioning system does not work well. Instead of depending on accurate estimations of angle or distance in order to derive the location with geometry, the fingerprinting technique associates location-dependent characteristics such as received signal strength to a location and uses these characteristics to infer the location. The advantage of this technique is that it is simple to deploy with no specialized hardware required at the mobile station except the wireless network interface card. Any existing wireless local area network infrastructure can be reused for this kind of positioning system. While empirical results and performance studies of such positioning systems are presented in the literature, analytical models that can be used as a framework for efficiently designing the positioning systems are not available. This dissertation develops an analytical model as a design tool and recommends a design guideline for such positioning systems in order to expedite the deployment process. A system designer can use this framework to strike a balance between the accuracy, the precision, the location granularity, the number of access points, and the location spacing. A systematic study is used to analyze the location fingerprint and discover its unique properties. The location fingerprint based on the received signal strength is investigated. Both deterministic and probabilistic approaches of location fingerprint representations are considered. The main objectives of this work are to predict the performance of such systems using a suitable model and perform sensitivity analyses that are useful for selecting proper system parameters such as number of access points and minimum spacing between any two different locations

    Vehicular Dynamic Spectrum Access: Using Cognitive Radio for Automobile Networks

    Get PDF
    Vehicular Dynamic Spectrum Access (VDSA) combines the advantages of dynamic spectrum access to achieve higher spectrum efficiency and the special mobility pattern of vehicle fleets. This dissertation presents several noval contributions with respect to vehicular communications, especially vehicle-to-vehicle communications. Starting from a system engineering aspect, this dissertation will present several promising future directions for vehicle communications, taking into consideration both the theoretical and practical aspects of wireless communication deployment. This dissertation starts with presenting a feasibility analysis using queueing theory to model and estimate the performance of VDSA within a TV whitespace environment. The analytical tool uses spectrum measurement data and vehicle density to find upper bounds of several performance metrics for a VDSA scenario in TVWS. Then, a framework for optimizing VDSA via artificial intelligence and learning, as well as simulation testbeds that reflect realistic spectrum sharing scenarios between vehicle networks and heterogeneous wireless networks including wireless local area networks and wireless regional area networks. Detailed experimental results justify the testbed for emulating a mobile dynamic spectrum access environment composed of heterogeneous networks with four dimensional mutual interference. Vehicular cooperative communication is the other proposed technique that combines the cooperative communication technology and vehicle platooning, an emerging concept that is expected to both increase highway utilization and enhance both driver experience and safety. This dissertation will focus on the coexistence of multiple vehicle groups in shared spectrum, where intra-group cooperation and inter-group competition are investigated in the aspect of channel access. Finally, a testbed implementation VDSA is presented and a few applications are developed within a VDSA environment, demonstrating the feasibility and benefits of some features in a future transportation system

    Ubiquitous interaction on wireless mobile devices

    Get PDF
    Master'sMASTER OF ENGINEERIN

    Location tracking in indoor and outdoor environments based on the viterbi principle

    Get PDF
    corecore