Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

A novel approach for rogue access point detection on the client-side

S Nikbakhsh, ABA Manaf, M Zamani… - 2012 26th …, 2012 - ieeexplore.ieee.org
There is a big risk for public Wi-Fi users being tricked into connecting to rogue access points.
Rogue access point is one of the most serious threats in WLAN, since it exposes a large …

Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes

Z Tang, Y Zhao, L Yang, S Qi, D Fang… - Mobile Information …, 2017 - Wiley Online Library
Evil‐Twin is becoming a common attack in smart home environments where an attacker can
set up a fake AP to compromise the security of the connected devices. To identify the fake …

[PDF][PDF] Wireless networks: developments, threats and countermeasures

MM Noor, WH Hassan - … Journal of Digital Information and Wireless …, 2013 - academia.edu
This paper discusses current threats in wireless networks and some academia research
reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man …

Catch me if you can: Rogue access point detection using intentional channel interference

R Jang, J Kang, A Mohaisen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which
can relay back and forth traffic between a legitimate AP and a wireless station, and act as a …

Beam-stealing: Intercepting the sector sweep to launch man-in-the-middle attacks on wireless IEEE 802.11 ad networks

D Steinmetzer, Y Yuan, M Hollick - … of the 11th ACM conference on …, 2018 - dl.acm.org
Millimeter-wave (mm-wave) communication systems provide high data-rates and enable
emerging application scenarios, such as' information showers' for location-based services …

Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls

G Chatzisofroniou… - Journal of Computer …, 2022 - content.iospress.com
Association attacks aim to manipulate WiFi clients into associating with a malicious access
point, by exploiting protocol vulnerabilities and usability features implemented on the …

Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength

B Pradeepkumar, K Talukdar… - … on Advances in …, 2017 - ieeexplore.ieee.org
With the widespread use of Wireless Local Area Network (WLAN) s Rogue Access Point
(AP) s have become a severe security threat to the WLAN user. In a recent survey, Gartner …

Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle

S Ganji, PR Kumar - IEEE Transactions on Wireless …, 2024 - ieeexplore.ieee.org
A Man-in-the-Middle (MiM) can collect over-the-air packets whether from a mobile or a base
station, process them, possibly modify them, and forward them to the intended receiver. This …

[PDF][PDF] Current threats of wireless networks

MM Noor, WH Hassan - The Third international conference on digital …, 2013 - core.ac.uk
This paper discusses current threats in wireless networks. Advancement and
countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue …