000 03491nam a22005415i 4500
001 978-3-319-07356-9
003 DE-He213
005 20170628034151.0
007 cr nn 008mamaa
008 140609s2014 gw | s |||| 0|eng d
020 _a9783319073569
_9978-3-319-07356-9
024 7 _a10.1007/978-3-319-07356-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aYang, Jie.
_eauthor.
245 1 0 _aPervasive Wireless Environments: Detecting and Localizing User Spoofing
_h[electronic resource] /
_cby Jie Yang, Yingying Chen, Wade Trappe, Jerry Cheng.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aVIII, 72 p. 27 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aIntroduction -- Feasibility of Launching User Spoofing -- Attack Detection Model -- Detection and Localizing Multiple Spoofing Attackers.-Detecting Mobile Agents Using Identity Fraud -- Related Work -- Conclusions and Future Work.
520 _aThis Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors present the new approach by offering a summary of the recent research and exploring the benefits and potential challenges of this method. This brief discusses the feasibility of launching user spoofing attacks and their impact on the wireless and sensor networks. Readers are equipped to understand several system models. One attack detection model exploits the spatial correlation of received signal strength (RSS) inherited from wireless devices as a foundation. Through experiments in practical environments, the authors evaluate the performance of the spoofing attack detection model. The brief also introduces the DEMOTE system, which exploits the correlation within the RSS trace based on each device’s identity to detect mobile attackers. A final chapter covers future directions of this field. By presenting complex technical information in a concise format, this brief is a valuable resource for researchers, professionals, and advanced-level students focused on wireless network security.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aInformation systems.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems and Communication Service.
650 2 4 _aInformation Systems Applications (incl. Internet).
700 1 _aChen, Yingying.
_eauthor.
700 1 _aTrappe, Wade.
_eauthor.
700 1 _aCheng, Jerry.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319073552
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-07356-9
912 _aZDB-2-SCS
999 _c18605
_d18605