Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Improved wireless security through p...
~
Air Force Institute of Technology.
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
Author:
Ramsey, Benjamin W.
Description:
127 p.
Notes:
Source: Dissertation Abstracts International, Volume: 76-02(E), Section: B.
Notes:
Adviser: Barry E. Mullins.
Contained By:
Dissertation Abstracts International76-02B(E).
Subject:
Computer science.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3639622
ISBN:
9781321242232
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
Ramsey, Benjamin W.
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
- 127 p.
Source: Dissertation Abstracts International, Volume: 76-02(E), Section: B.
Thesis (Ph.D.)--Air Force Institute of Technology, 2014.
This item must not be sold to any third party vendors.
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Traditional bit-layer defenses including encryption keys and MAC address control lists are vulnerable to extraction and identity spoofing, respectively. This dissertation explores three novel strategies to leverage the wireless physical layer to improve security in low-rate wireless personal area networks. The first, physical layer protocol manipulation, identifies true transceiver design within remote devices through analysis of replies in response to packets transmitted with modified physical layer headers. Results herein demonstrate a methodology that correctly differentiates among six IEEE 802.15.4 transceiver classes with greater than 99% accuracy, regardless of claimed bit-layer identity. The second strategy, radio frequency fingerprinting, accurately identifies the true source of every wireless transmission in a network, even among devices of the same design and manufacturer. Results suggest that even low-cost signal collection receivers can achieve greater than 90% authentication accuracy within a defense system based on radio frequency fingerprinting. The third strategy, based on received signal strength quantification, can be leveraged to rapidly locate suspicious transmission sources and to perform physical security audits of critical networks. Results herein reduce mean absolute percentage error of a widely-utilized distance estimation model 20% by examining signal strength measurements from real-world networks in a military hospital and a civilian hospital.
ISBN: 9781321242232Subjects--Topical Terms:
199325
Computer science.
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
LDR
:02612nmm a2200289 4500
001
457715
005
20150805065225.5
008
150916s2014 ||||||||||||||||| ||eng d
020
$a
9781321242232
035
$a
(MiAaPQ)AAI3639622
035
$a
AAI3639622
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Ramsey, Benjamin W.
$3
708760
245
1 0
$a
Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting.
300
$a
127 p.
500
$a
Source: Dissertation Abstracts International, Volume: 76-02(E), Section: B.
500
$a
Adviser: Barry E. Mullins.
502
$a
Thesis (Ph.D.)--Air Force Institute of Technology, 2014.
506
$a
This item must not be sold to any third party vendors.
520
$a
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Traditional bit-layer defenses including encryption keys and MAC address control lists are vulnerable to extraction and identity spoofing, respectively. This dissertation explores three novel strategies to leverage the wireless physical layer to improve security in low-rate wireless personal area networks. The first, physical layer protocol manipulation, identifies true transceiver design within remote devices through analysis of replies in response to packets transmitted with modified physical layer headers. Results herein demonstrate a methodology that correctly differentiates among six IEEE 802.15.4 transceiver classes with greater than 99% accuracy, regardless of claimed bit-layer identity. The second strategy, radio frequency fingerprinting, accurately identifies the true source of every wireless transmission in a network, even among devices of the same design and manufacturer. Results suggest that even low-cost signal collection receivers can achieve greater than 90% authentication accuracy within a defense system based on radio frequency fingerprinting. The third strategy, based on received signal strength quantification, can be leveraged to rapidly locate suspicious transmission sources and to perform physical security audits of critical networks. Results herein reduce mean absolute percentage error of a widely-utilized distance estimation model 20% by examining signal strength measurements from real-world networks in a military hospital and a civilian hospital.
590
$a
School code: 0002.
650
4
$a
Computer science.
$3
199325
650
4
$a
Computer engineering.
$3
212944
690
$a
0984
690
$a
0464
710
2
$a
Air Force Institute of Technology.
$b
Electrical & Computer Engineering (ENG).
$3
660261
773
0
$t
Dissertation Abstracts International
$g
76-02B(E).
790
$a
0002
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3639622
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000108654
電子館藏
1圖書
學位論文
TH 2014
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3639622
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login