Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

On fast and accurate detection of unauthorized wireless access points using clock skews

S Jana, SK Kasera - Proceedings of the 14th ACM international …, 2008 - dl.acm.org
We explore the use of clock skew of a wireless local area network access point (AP) as its
fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using …

A timing-based scheme for rogue AP detection

H Han, B Sheng, CC Tan, Q Li… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …

Who is peeping at your passwords at Starbucks?—To catch an evil twin access point

Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …

Active user-side evil twin access point detection using statistical techniques

C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …

Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs

W Wei, K Suh, B Wang, Y Gu, J Kurose… - Proceedings of the 7th …, 2007 - dl.acm.org
Rogue (unauthorized) wireless access points pose serious security threats to local networks.
In this paper, we propose two online algorithms to detect rogue access points using …

An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks

M Agarwal, S Biswas, S Nandi - International Journal of Wireless …, 2018 - Springer
The MAC layer of 802.11 protocol possess inherent weakness making it vulnerable to
various security attacks like denial of service, deauthentication attack, flooding attacks …

Exploiting Wireless Received Signal Strength Indicators to Detect Evil‐Twin Attacks in Smart Homes

Z Tang, Y Zhao, L Yang, S Qi, D Fang… - Mobile Information …, 2017 - Wiley Online Library
Evil‐Twin is becoming a common attack in smart home environments where an attacker can
set up a fake AP to compromise the security of the connected devices. To identify the fake …

Locating rogue access point using fine-grained channel information

C Wang, X Zheng, Y Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Rogue access point (AP) has emerged as an important security problem in WLANs.
However, it is a challenge task to localize the rogue AP with both high accuracy and minimal …

Rogue-access-point detection: Challenges, solutions, and future directions

R Beyah, A Venkataraman - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
Since wireless access points have reached commodity pricing, the appeal of deploying them
in an unauthorized fashion has grown. Unlike traditional attacks, which originate outside the …