S Jana, SK Kasera - Proceedings of the 14th ACM international …, 2008 - dl.acm.org
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using …
Most of the security threats in various communications networks are posed by the illegitimate entities that enter or intrude within the network perimeter, which could commonly be termed …
Use of mobile computing devices such as laptops, PDAs, and Wi-Fi enabled phones is increasing in the workplace. As the usage of corporate 802.11 wireless networks (WLANs) …
This paper considers a category of rogue access points (APs) that pretend to be legitimate APs to lure users to connect to them. We propose a practical timing-based technique that …
Mobile devices are increasingly equipped with multiple network interfaces with complementary characteristics. In particular, the Wi-Fi interface has high throughput and …
Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …
C Arackaparambil, S Bratus, A Shubina… - Proceedings of the third …, 2010 - dl.acm.org
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. But …
C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally- driven research works. These works range from performance analysis to protocol …