Active user-side evil twin access point detection using statistical techniques

C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …

A novel approach for rogue access point detection on the client-side

S Nikbakhsh, ABA Manaf, M Zamani… - 2012 26th …, 2012 - ieeexplore.ieee.org
There is a big risk for public Wi-Fi users being tricked into connecting to rogue access points.
Rogue access point is one of the most serious threats in WLAN, since it exposes a large …

Online detection of fake access points using received signal strengths

T Kim, H Park, H Jung, H Lee - 2012 IEEE 75th vehicular …, 2012 - ieeexplore.ieee.org
Wireless access points (APs) are widely used for the convenience and productivity of
smartphone users. The growing popularity of wireless local area networks (WLANs) …

Rogue access point detection and localization

TM Le, RP Liu, M Hedley - 2012 IEEE 23rd International …, 2012 - ieeexplore.ieee.org
The threat of rogue Access Points (APs) has attracted significant attentions from both
industrial and academic researchers. However existing solutions focus on rogue AP …

The proposal of IEEE 802.11 network access point authentication mechanism using a covert channel

K Sawicki, Z Piotrowski - 2012 19th International Conference on …, 2012 - ieeexplore.ieee.org
The proposal of IEEE 802.11 network access point authentication mechanism using a covert
channel Page 1 The proposal of IEEE 802.11 network access point authentication mechanism …

[PDF][PDF] Detecçao de APs Falsos Utilizando TCP-RTT Relatório de Acompanhamento-SAAP

FJ Chaulet - cin.ufpe.br
O crescimento do uso de redes sem fio móveis aconteceu exponencialmente nos últimos
anos, em virtude da baixa nos preços dos equipamentos eletrônicos que possuem interface …

[图书][B] Security threats to the MAC-layer in wireless networks

J Choi - 2012 - search.proquest.com
Medium access control (MAC) protocol security is important in wireless networks due to the
lack of physical access control that normally exists in wired networks in the form of …

Robust Authentication of Public Access Points Using Digital Certificates–A Novel Approach

A Srinivasan, L Chennupati - … 2012, Melbourne, Australia, December 12-13 …, 2012 - Springer
This paper present a novel Certificate-based authentication of public access points (APs).
The presented approach is the first to consider authentication of public APs. It is also the first …

[引用][C] A method for detecting unauthorized access point over 3G network

I Kim, JI Cho, TS Shon, JS Moon - Journal of the …, 2012 - Korea Institute of Information …