A timing-based scheme for rogue AP detection

H Han, B Sheng, CC Tan, Q Li… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …

Defending against vehicular rogue APs

H Han, F Xu, CC Tan, Y Zhang… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
This paper considers vehicular rogue access points (APs) that rogue APs are set up in
moving vehicles to mimic legitimate roadside APs to lure users to associate to them. Due to …

Secure MAC-layer protocol for captive portals in wireless hotspots

J Choi, SY Chang, D Ko, YC Hu - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Wireless access points largely fall into three categories: home and small business networks,
enterprise networks, and hotspots. Wi-Fi Protected Access (WPA) provides solutions to …

[PDF][PDF] Detecting the evil twin attack in a single hop wireless network using four-square antennas

MC Carrington - 2011 - repository.library.carleton.ca
Recent technological advances have increased the prevalence of wireless networks in our
society. Users can easily access the Internet at home, work, school or even while travelling …

Research on Developing Proactive Protection Tool for Preventing Illegal Access Point Intrusion in Network-Based Wireless Environment

M Salman, B Budiardjo, K Ramli, F Abdillah - 2011 - asmedigitalcollection.asme.org
Wireless network characteristic is quite different from wired networks. It is more vulnerable to
security disturbances. Furthermore, the convenience of the user in accessing network …

[引用][C] Measuring Accuracy in Anomaly Identification of Illegal Access Point with Proactive Intrusion Detection System for Network-based Wireless Environment

[引用][C] Effective Rogue Access Point Detection Method in Wireless LAN

D Kang, K Kim, O Choi, K Kim - … of the Korea …, 2011 - Korea Information Processing …