VR-defender: Self-defense against vehicular rogue APs for drive-thru internet

H Han, F Xu, CC Tan, Y Zhang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper considers the problem of vehicular rogue access points (APs) for drive-thru
Internet. Vehicular rogue APs are set up in moving vehicles to mimic legitimate roadside APs …

A novel approach to detection of mobile rogue access points

I Kim, J Seo, T Shon, J Moon - Security and Communication …, 2014 - Wiley Online Library
Rogue access points (APs) have been used in several attacks such as packet sniffing and
man‐in‐the‐middle attacks. It is becoming a serious security threat to users in public and …

[PDF][PDF] A novel approach for fake access point detection and prevention in wireless network

S Thite, S Vanjale, PB Mane - International Journal of Computer …, 2014 - researchgate.net
Currently many organizations utilize the wireless LAN to provide the access channel to the
Internet and Intranet enabling the flexible workforce. While doing so, communications with …

Research and prevention of rogue ap based mitm in wireless network

M Cai, Z Wu, J Zhang - … on P2P, Parallel, Grid, Cloud and …, 2014 - ieeexplore.ieee.org
Due to the wireless network is popularly used, the security of wireless network is more
important than past. Wireless network is considerably more susceptible to MitM (man-in-the …

Secure authentication scheme using dual channels in rogue access point environments

A Alrawais, A Alhothaily, X Cheng - … , WASA 2014, Harbin, China, June 23 …, 2014 - Springer
The ubiquitous deployment of Rogue Access Points (RAPs) presents security issues in
Wireless LAN (WLAN) environments. Therefore, authentication plays a crucial role in …

A method of authenticating WLAN APs for smartphones

DO Shin, J Kang, DH Nyang, S Lee… - The Journal of Korean …, 2014 - koreascience.kr
The increase of smartphone users have made mobile carriers offload increasingly
congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee …

[PDF][PDF] Applying TCP profiling to detect wireless rogue access point

J Yu - Proceedings of the International Conference on …, 2014 - world-comp.org
There are many studies addressing the risk and vulnerability of 802.11-based Wireless LAN
(WLAN). However, Rogue Access Points (AP) attacks, although well known and widely …

[PDF][PDF] Detection Of Rogue Access Points Present In The Wlan At The Server Side

SA Pattar - Proceedings of IRF International Conference, 2014 - digitalxplore.org
A Rogue Access Point is a wireless access point that has either been installed on a secure
network without explicit authorization from a local network management or has been created …

[PDF][PDF] k-SVM 을이용한Rogue AP 탐지기법연구

이재욱, 이시영, 문종섭 - 정보보호학회논문지, 2014 - koreascience.kr
요 약인가된 AP (Access Point) 에 대해서만 사용을 허용하는 무선 통신 환경에서, 스마트폰의
테더링 (tethering) 기능에 의한 로그 AP (rogue AP) 사용은 자료 유출과 같은 심각한 보안 …

[图书][B] Towards Secure, Power-Efficient and Location-Aware Mobile Computing

H Han - 2014 - search.proquest.com
In the post-PC era, mobile devices will replace desktops and become the main personal
computer for many people. People rely on mobile devices such as smartphones and tablets …