Publication Type
Magazine Article
Version
acceptedVersion
Publication Date
10-2010
Abstract
Wireless networks play an important role in our everyday lives, at the workplace and at home. However, they are also relatively vulnerable: physically located off site, attackers can circumvent wireless security protocols such as WEP, WPA, and even to some extent WPA2, presenting a security risk to the entire network. To address this problem, we propose SecureAngle, a system designed to operate alongside existing wireless security protocols, adding defense in depth. SecureAngle leverages multi-antenna APs to profile the directions at which a client's signal arrives, using this angle-of-arrival (AoA) information to construct signatures that uniquely identify each client. We identify SecureAngle's role of providing a fine-grained location service in a multi-path indoor environment. With this location information, we investigate how an AP might create a "virtual fence" that drops frames received from clients physically located outside a building or office. With SecureAngle signatures, we also identify how an AP can prevent malicious parties from spoofing the link-layer address of legitimate clients. We discuss how SecureAngle might aid whitespace radios in yielding to incumbent transmitters, as well as its role in directional downlink transmissions with uplink AoA information.
Keywords
Wireless, 802.11, SecureAngle, Angle of arrival
Discipline
Software Engineering
Research Areas
Software and Cyber-Physical Systems
Publication
Computer Communication Review
Volume
40
Issue
4
First Page
415
Last Page
416
ISSN
0146-4833
Identifier
10.1145/1851275.1851238
Publisher
ACM
City or Country
New York
Citation
XIONG, Jie and JAMIESON, Kyle.
SecureAngle: Improving wireless security using angle-of-arrival information. (2010). Computer Communication Review. 40, (4), 415-416.
Available at: https://ink.library.smu.edu.sg/sis_research/2707
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
http://doi.org/10.1145/1851275.1851238
Comments
Based on paper for ACM SIGCOMM Conference, August 30-September 3, 2010, New Delhi, India