Localization for Intrusion Detection in Wireless Local Area Networks

dc.contributor.advisorDr Mihail Sichitiu, Committee Chairen_US
dc.contributor.advisorDr Peng Ning, Committee Memberen_US
dc.contributor.advisorDr Wenye Wang, Committee Memberen_US
dc.contributor.authorBhargava, Vishalen_US
dc.date.accessioned2010-04-02T17:54:42Z
dc.date.available2010-04-02T17:54:42Z
dc.date.issued2004-11-19en_US
dc.degree.disciplineComputer Networkingen_US
dc.degree.levelthesisen_US
dc.degree.nameMSen_US
dc.description.abstractOn a wired network, authentication is implicitly provided by physical access; if a user is close enough to the network to plug in a cable, he must have gotten past the receptionist at the front door. While this is a weak definition of authentication, and one that is clearly inappropriate for high-security environments, it works reasonably well as long as the physical access control procedures are strong. Wireless Networks are attractive, in large part, because physical access is not required to use network resources. Therefore, a major component of maintaining network security is ensuring that stations attempting to associate with the network are allowed to do so. In this paper, we present a method to identify the location of wireless LAN users, and thus defend a "parking lot" attack.en_US
dc.identifier.otheretd-10172003-081419en_US
dc.identifier.urihttp://www.lib.ncsu.edu/resolver/1840.16/323
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subject802.11ben_US
dc.subjectRSSIen_US
dc.subjectactive attackeren_US
dc.subjectparking lot attacken_US
dc.subjectSecurityen_US
dc.subjectLocalizationen_US
dc.subjectWireless LANen_US
dc.titleLocalization for Intrusion Detection in Wireless Local Area Networksen_US

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
etd.pdf
Size:
1.37 MB
Format:
Adobe Portable Document Format

Collections