{"title":"为密集Wi-Fi部署提供安全干扰报告","authors":"P. A. Frangoudis, D. Zografos, George C. Polyzos","doi":"10.1145/1658997.1659018","DOIUrl":null,"url":null,"abstract":"We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that only few APs can operate at the same location on non-overlapping frequencies. Detection of interference conditions is the first step towards its mitigation. We follow a client-centric approach, where wireless clients monitor and report Wi-Fi AP presence. We focus on the security aspects of such a scheme, assuming that clients may attack the reporting mechanism by submitting fake information. Our early evaluation shows that for certain attacker strategies, simple mechanisms can effectively filter invalid reports with minimal loss of information.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Secure interference reporting for dense Wi-Fi deployments\",\"authors\":\"P. A. Frangoudis, D. Zografos, George C. Polyzos\",\"doi\":\"10.1145/1658997.1659018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that only few APs can operate at the same location on non-overlapping frequencies. Detection of interference conditions is the first step towards its mitigation. We follow a client-centric approach, where wireless clients monitor and report Wi-Fi AP presence. We focus on the security aspects of such a scheme, assuming that clients may attack the reporting mechanism by submitting fake information. Our early evaluation shows that for certain attacker strategies, simple mechanisms can effectively filter invalid reports with minimal loss of information.\",\"PeriodicalId\":181045,\"journal\":{\"name\":\"Co-Next Student Workshop '09\",\"volume\":\"93 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Co-Next Student Workshop '09\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1658997.1659018\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Co-Next Student Workshop '09","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1658997.1659018","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure interference reporting for dense Wi-Fi deployments
We study the problem of interference detection in dense Wi-Fi deployments, which are a reality in most modern metropolitan areas. Interference among neighbor Wi-Fi cells stems from the anarchic deployment of Wi-Fi access points (APs) and the fact that only few APs can operate at the same location on non-overlapping frequencies. Detection of interference conditions is the first step towards its mitigation. We follow a client-centric approach, where wireless clients monitor and report Wi-Fi AP presence. We focus on the security aspects of such a scheme, assuming that clients may attack the reporting mechanism by submitting fake information. Our early evaluation shows that for certain attacker strategies, simple mechanisms can effectively filter invalid reports with minimal loss of information.