%0 Journal Article %T Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods %A G¨¹enther Lackner %A Udo Payer %A Peter Teufl %J International Journal of Network Security %D 2009 %I Femto Technique %X Unwanted use of wireless networks has become a wellknown problem in recent years. One attempt to solve this problem is the use of access control lists, which are associated with accredited MAC addresses. But since MAC addresses can be spoofed very easily, improved mechanisms are needed to attest the uniqueness of a dedicated wireless station. Today, all known approaches are based on the idea to generate NIC-speci¡¥c pro¡¥les derived from invariant NIC-characteristics. In doing so, unique features are either extracted from RF-components or from the timing behavior of the MAC-chip. To give a review and to classify all proposed approaches, we start with a short introduction to all underlying ideas and will conclude with a comparison of these mechanisms. %K Wireless network security %K MAC address spoofing %K fingerprinting %U http://ijns.femto.com.tw/download_paper.jsp?PaperID=IJNS-2008-06-21-2&PaperName=ijns-v9-n2/ijns-2009-v9-n2-p164-172.pdf