Subverting MAC: How authentication in mobile environment can be undermined | IEEE Conference Publication | IEEE Xplore