文件名称:jen_hall
介绍说明--下载内容均来自于网络,请自行研究使用
The need for robust access control mechanisms is paramount, especially in Wireless
Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current
authentication systems are vulnerable to device impersonation by rogue devices.
Within cellular mobile networks, this threat is actualized by cloning cell phones,
and using the clones for obtaining free services. A well known example in Wireless
Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing.
In this case, an attacker captures the MAC address of an authorized device and
programs it into his device, in order to obtain unauthorized access. The threat of
address spoofing is equally applicable to Bluetooth (BT) ad-hoc networks.
Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current
authentication systems are vulnerable to device impersonation by rogue devices.
Within cellular mobile networks, this threat is actualized by cloning cell phones,
and using the clones for obtaining free services. A well known example in Wireless
Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing.
In this case, an attacker captures the MAC address of an authorized device and
programs it into his device, in order to obtain unauthorized access. The threat of
address spoofing is equally applicable to Bluetooth (BT) ad-hoc networks.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
jen_hall.pdf