z-logo
open-access-imgOpen Access
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Author(s) -
Michel Barbeau,
Jyanthi Hall,
Evangelos Kranakis
Publication year - 2006
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-36646-6
DOI - 10.1007/11801412_8
Subject(s) - computer science , computer security , intrusion detection system , wireless , wireless network , simple (philosophy) , wireless sensor network , intrusion , computer network , telecommunications , philosophy , geochemistry , epistemology , geology
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio Frequency Fingerprinting and User Mobility Profiles and discuss details of our methodologies for building enhanced intrusion detection systems for future wireless and mobile networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom