Detection & Analysis of Evil Twin Attack in Wireless Network.

V Modi, C Parekh - International Journal of Advanced …, 2017 - search.ebscohost.com
Due to increasing demand of wireless internet access open Wi-Fi internet service is
available at public places and secured Wi-Fi internet service is available at …

The rogue access point identification: a model and classification review

D DA Arisandi… - The Indonesian …, 2021 - repository.univrab.ac.id
Most people around the world make use of public Wi-Fi hotspots, as their daily routine
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …

Position-based Rogue Access Point Detection

W Liu, P Papadimitratos - arXiv preprint arXiv:2406.01927, 2024 - arxiv.org
Rogue Wi-Fi access point (AP) attacks can lead to data breaches and unauthorized access.
Existing rogue AP detection methods and tools often rely on channel state information (CSI) …

A Detection Technique Using Dual Authentication Stages Framework for Rogue Access Point Identification

D Arisandia, NM Ahmad, S Kannan - IOP Conference Series …, 2022 - iopscience.iop.org
Abstract Wi-Fi hotspot or Access point indicates many threats that lead to compromise a
user's identity, personal data, and network integrity. Therefore, this will uncover the users to …

Experimental assessment of RRM techniques in 5 GHz dense WiFi networks using REMs

R Dionisio, P Marques, T Alves… - 2018 19th IEEE …, 2018 - ieeexplore.ieee.org
The increasing acceptance of WiFi has created unprecedented levels of congestion in the
unlicensed frequency bands, especially in densely populated areas. This results mainly …

Secured LTE-Wi-Fi Offloading Using RTT Based Evading Malicious Access Point (EMAP) Algorithm

G Raja, A Ganapathisubramaniyan… - 2019 IEEE 4th …, 2019 - ieeexplore.ieee.org
Exponential growth of mobile devices and increased usage of data by mobile users creates
a high data traffic problem in cellular networks. Data offloading to Wi-Fi networks provides …

Passenger vehicle wireless access point security system

S Jester, P Watson, S Bates - US Patent 11,418,956, 2022 - Google Patents
Techniques are described to detect and/or prevent malicious wireless attacks and/or
suspicious wireless activity related to a wireless network in a commercial passenger vehicle …

[PDF][PDF] Experimental Assessment of RRM Techniques in

R Dionisio, P Marques, T Alves, J Ribeiro - core.ac.uk
The increasing acceptance of WiFi has created unprecedented levels of congestion in the
unlicensed frequency bands, especially in densely populated areas. This results mainly …

Comparison of systems to detect rogue access points

A Lennartsson, H Melander - 2019 - diva-portal.org
A hacker might use a rogue access point to gain access to a network, this poses a threat to
the individuals connected to it. The hacker might have the potential to leak corporate data or …

[引用][C] Monitoring and Assessment of the Wi-Fi Signal Quality and Detection of Unauthorized APs on High-End Wireless Networks

RMR Rocha - 2017