Towards programmable enterprise WLANS with Odin

L Suresh, J Schulz-Zander, R Merz… - Proceedings of the first …, 2012 - dl.acm.org
We present Odin, an SDN framework to introduce programmability in enterprise wireless
local area networks (WLANs). Enterprise WLANs need to support a wide range of services …

On fast and accurate detection of unauthorized wireless access points using clock skews

S Jana, SK Kasera - Proceedings of the 14th ACM international …, 2008 - dl.acm.org
We explore the use of clock skew of a wireless local area network access point (AP) as its
fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[PDF][PDF] Designing High Performance Enterprise Wi-Fi Networks.

R Murty, J Padhye, R Chandra, A Wolman, B Zill - NSDI, 2008 - usenix.org
Use of mobile computing devices such as laptops, PDAs, and Wi-Fi enabled phones is
increasing in the workplace. As the usage of corporate 802.11 wireless networks (WLANs) …

A timing-based scheme for rogue AP detection

H Han, B Sheng, CC Tan, Q Li… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …

Blue-Fi: enhancing Wi-Fi performance using bluetooth signals

G Ananthanarayanan, I Stoica - … of the 7th international conference on …, 2009 - dl.acm.org
Mobile devices are increasingly equipped with multiple network interfaces with
complementary characteristics. In particular, the Wi-Fi interface has high throughput and …

Who is peeping at your passwords at Starbucks?—To catch an evil twin access point

Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …

On the reliability of wireless fingerprinting using clock skews

C Arackaparambil, S Bratus, A Shubina… - Proceedings of the third …, 2010 - dl.acm.org
Determining whether a client station should trust an access point is a known problem in
wireless security. Traditional approaches to solving this problem resort to cryptography. But …

Active user-side evil twin access point detection using statistical techniques

C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …

Experimenting with commodity 802.11 hardware: Overview and future directions

P Serrano, P Salvador, V Mancuso… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-
driven research works. These works range from performance analysis to protocol …