Skip to Main Content
The paper presents a concept of using a covert channel to authenticate access points. The covert channel is performed using Beacon frames and Timestamp fields and takes advantage of the least significant bits of these fields.
Microwave Radar and Wireless Communications (MIKON), 2012 19th International Conference on (Volume:2 )
Date of Conference: 21-23 May 2012