{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:27:13Z","timestamp":1774967233387,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001866","name":"Fonds National de la Recherche Luxembourg","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001866","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2642687.2642691","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"87-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Undesired relatives"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Lanze","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Ignacio","family":"Ponce-Alcaide","sequence":"additional","affiliation":[{"name":"University of M\u00e1laga, Malaga, Spain"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741894"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_5_1","volume-title":"Secure Open Wireless Access. In Black Hat USA","author":"Cross T.","year":"2011","unstructured":"T. Cross and T. Takahashi . Secure Open Wireless Access. In Black Hat USA 2011 . T. Cross and T. Takahashi. Secure Open Wireless Access. In Black Hat USA 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_7_1","volume-title":"15th Conference on USENIX Security Symposium (Usenix Sec 2006)","author":"Franklin J.","year":"2006","unstructured":"J. Franklin , D. McCoy , P. Tabriz , V. Neagoe , J. Van Randwyk , and D. Sicker . Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting . In 15th Conference on USENIX Security Symposium (Usenix Sec 2006) , 2006 . J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. Van Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In 15th Conference on USENIX Security Symposium (Usenix Sec 2006), 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544294"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062077"},{"key":"e_1_3_2_1_11_1","unstructured":"IEEE Computer Society. Standard 802.11--2012: IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. http:\/\/standards.ieee.org\/findstds\/standard\/802.11--2012.html.  IEEE Computer Society. Standard 802.11--2012: IEEE Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. http:\/\/standards.ieee.org\/findstds\/standard\/802.11--2012.html."},{"key":"e_1_3_2_1_12_1","volume-title":"June","author":"IETF.","year":"2000","unstructured":"IETF. RFC 2865: Remote Authentication Dial In User Service (RADIUS) , June 2000 . http:\/\/www.rfc-editor.org\/rfc\/rfc2865.txt. IETF. RFC 2865: Remote Authentication Dial In User Service (RADIUS), June 2000. http:\/\/www.rfc-editor.org\/rfc\/rfc2865.txt."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"e_1_3_2_1_14_1","volume-title":"Online Detection of Fake Access Points Using Received Signal Strengths. In 75th IEEE Vehicular Technology Conference (VTC","author":"Kim T.","year":"2012","unstructured":"T. Kim , H. Park , H. Jung , and H. Lee . Online Detection of Fake Access Points Using Received Signal Strengths. In 75th IEEE Vehicular Technology Conference (VTC Spring 2012 ), 2012. T. Kim, H. Park, H. Jung, and H. Lee. Online Detection of Fake Access Points Using Received Signal Strengths. In 75th IEEE Vehicular Technology Conference (VTC Spring 2012), 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590333"},{"key":"e_1_3_2_1_16_1","volume-title":"Clock Skew Based Remote Device Fingerprinting Demystified. In IEEE Global Telecommunications Conference (GLOBECOM 2012)","author":"Lanze F.","year":"2012","unstructured":"F. Lanze , A. Panchenko , B. Braatz , and A. Zinnen . Clock Skew Based Remote Device Fingerprinting Demystified. In IEEE Global Telecommunications Conference (GLOBECOM 2012) , 2012 . F. Lanze, A. Panchenko, B. Braatz, and A. Zinnen. Clock Skew Based Remote Device Fingerprinting Demystified. In IEEE Global Telecommunications Conference (GLOBECOM 2012), 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.178"},{"key":"e_1_3_2_1_18_1","volume-title":"WiFiHop - Mitigating the Evil Twin Attack Through Multi-hop Detection. In 16th European Conference on Research in Computer Security (ESORICS'11)","author":"M\u00f3nica D.","year":"2011","unstructured":"D. M\u00f3nica and C. Ribeiro . WiFiHop - Mitigating the Evil Twin Attack Through Multi-hop Detection. In 16th European Conference on Research in Computer Security (ESORICS'11) , 2011 . D. M\u00f3nica and C. Ribeiro. WiFiHop - Mitigating the Evil Twin Attack Through Multi-hop Detection. In 16th European Conference on Research in Computer Security (ESORICS'11), 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"DEFCON'20 Hacking Conference","author":"Moxie Marlinspike M. R.","year":"2012","unstructured":"M. R. Moxie Marlinspike , David Hulton . Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 . In DEFCON'20 Hacking Conference , 2012 . M. R. Moxie Marlinspike, David Hulton. Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2. In DEFCON'20 Hacking Conference, 2012."},{"key":"e_1_3_2_1_20_1","unstructured":"K. N. N. Asokan Valtteri Niemi. Man-in-the-Middle in Tunneled Authentication Protocols. http:\/\/eprint.iacr.org\/2002\/163.pdf 2002.  K. N. N. Asokan Valtteri Niemi. Man-in-the-Middle in Tunneled Authentication Protocols. http:\/\/eprint.iacr.org\/2002\/163.pdf 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1592979"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544302"},{"key":"e_1_3_2_1_25_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In 18th USENIX Security Symposium (SSYM '09)","author":"Sunshine J.","year":"2009","unstructured":"J. Sunshine , S. Egelman , H. Almuhimedi , N. Atri , and L. F. Cranor . Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In 18th USENIX Security Symposium (SSYM '09) , 2009 . J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In 18th USENIX Security Symposium (SSYM '09), 2009."}],"event":{"name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWiM'14","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642687.2642691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:31Z","timestamp":1750231171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642691"}},"subtitle":["protection mechanisms against the evil twin attack in IEEE 802.11"],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":25,"alternative-id":["10.1145\/2642687.2642691","10.1145\/2642687"],"URL":"https:\/\/doi.org\/10.1145\/2642687.2642691","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}