Introduction - If you have any usage issues, please Google them yourself
The need for robust access control mechanisms is paramount, especially in Wireless
Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current
authentication systems are vulnerable to device impersonation by rogue devices.
Within cellular mobile networks, this threat is actualized by cloning cell phones,
and using the clones for obtaining free services. A well known example in Wireless
Fidelity (WiFi)/802.11 networks is Media Access Control (MAC) address spoofing.
In this case, an attacker captures the MAC address of an authorized device and
programs it into his device, in order to obtain unauthorized access. The threat of
address spoofing is equally applicable to Bluetooth (BT) ad-hoc networks.