A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Yu Seung | - |
dc.contributor.author | Tague, Patrick | - |
dc.contributor.author | Lee, Heejo | - |
dc.contributor.author | Kim, Hyogon | - |
dc.date.accessioned | 2021-09-04T10:57:32Z | - |
dc.date.available | 2021-09-04T10:57:32Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2015-11 | - |
dc.identifier.issn | 1022-0038 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/92007 | - |
dc.description.abstract | Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi networks from potential eavesdroppers. This non-cryptographic approach requires neither any pre-shared key or high deployment costs. Defensive jammers geographically confine the wireless coverage of Wi-Fi access point, and thus block the message reception outside an arbitrary boundary at a physical layer. We provide a theoretical model fine tuning the jamming parameters for jammer placement. We then discuss practical considerations including optimized jammer arrangement algorithms, interference countermeasures to legitimate communications, and countermeasures against advanced attackers. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | COMMUNICATION | - |
dc.title | A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Heejo | - |
dc.contributor.affiliatedAuthor | Kim, Hyogon | - |
dc.identifier.doi | 10.1007/s11276-015-0935-y | - |
dc.identifier.scopusid | 2-s2.0-84945447530 | - |
dc.identifier.wosid | 000367070400013 | - |
dc.identifier.bibliographicCitation | WIRELESS NETWORKS, v.21, no.8, pp.2631 - 2647 | - |
dc.relation.isPartOf | WIRELESS NETWORKS | - |
dc.citation.title | WIRELESS NETWORKS | - |
dc.citation.volume | 21 | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 2631 | - |
dc.citation.endPage | 2647 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | COMMUNICATION | - |
dc.subject.keywordAuthor | Defensive jamming | - |
dc.subject.keywordAuthor | Eavesdropping | - |
dc.subject.keywordAuthor | Wi-Fi networks | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.