Mechanism for detection of attacks based on impersonation in a wireless network
DC CAFCFirst Claim
Patent Images
1. A method for detecting impersonation based attacks at a wireless node of a wireless communication network, comprising the steps of:
- a) operatively connecting the wireless node with an intrusion detection module and providing the intrusion detection module with a copy of original data frames transmitted by the wireless node over a wireless interface;
b) detecting at the intrusion detection module incoming data frames received over the wireless interface;
c) comparing at the intrusion detection module the information in the copy with the information in the incoming data frames; and
d) recognizing an impersonating attack when the intrusion detection module determines that the information in the copy differs from the information in the incoming data frames.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
An impersonation detection system for a wireless node of a wireless communication network is described. The system comprises an intrusion detection module for correlating the original data frames transmitted by the wireless node with incoming data frames received over the air interface. The wireless node is connected to the intrusion detection module over a secure link, for receiving a copy of the original data frames. A method for detecting impersonation based attacks at a wireless node is also disclosed.
-
Citations
20 Claims
-
1. A method for detecting impersonation based attacks at a wireless node of a wireless communication network, comprising the steps of:
-
a) operatively connecting the wireless node with an intrusion detection module and providing the intrusion detection module with a copy of original data frames transmitted by the wireless node over a wireless interface; b) detecting at the intrusion detection module incoming data frames received over the wireless interface; c) comparing at the intrusion detection module the information in the copy with the information in the incoming data frames; and d) recognizing an impersonating attack when the intrusion detection module determines that the information in the copy differs from the information in the incoming data frames. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An impersonation detection system for a wireless node of a wireless communication network, the node for transmitting original data frames over a wireless interface comprising:
-
an intrusion detection module for correlating the original data frames with incoming data frames received over the air interface; and connection means between the wireless node and the intrusion detection module for providing the intrusion detection module with a copy of the original data frames. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A wireless node for a wireless network comprising:
-
means for transmitting outgoing data frames over a wireless interface; an intrusion detection module for correlating the outgoing data frames with incoming data frames received from the air interface; and a secure link between the wireless node and the intrusion detection module for providing the intrusion detection module with a copy of the outgoing data frames. - View Dependent Claims (18, 19, 20)
-
Specification