Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

On fast and accurate detection of unauthorized wireless access points using clock skews

S Jana, SK Kasera - Proceedings of the 14th ACM international …, 2008 - dl.acm.org
We explore the use of clock skew of a wireless local area network access point (AP) as its
fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using …

A timing-based scheme for rogue AP detection

H Han, B Sheng, CC Tan, Q Li… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …

Who is peeping at your passwords at Starbucks?—To catch an evil twin access point

Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …

EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi

P Shrivastava, MS Jamal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Spoofing the identity of a WiFi access point (AP) is trivial. Consequently, an adversary can
impersonate the legitimate AP (LAP) by mimicking its network name (SSID) and MAC …

Active user-side evil twin access point detection using statistical techniques

C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …

Experimenting with commodity 802.11 hardware: Overview and future directions

P Serrano, P Salvador, V Mancuso… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally-
driven research works. These works range from performance analysis to protocol …

OS fingerprinting: New techniques and a study of information gain and obfuscation

B Anderson, D McGrew - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Passive operating system fingerprinting reveals valuable information to the defenders of
heterogeneous private networks; at the same time, attackers can use fingerprinting to …

A hybrid rogue access point protection framework for commodity Wi-Fi networks

L Ma, AY Teymorian, X Cheng - IEEE INFOCOM 2008-The 27th …, 2008 - ieeexplore.ieee.org
We develop a practical and comprehensive hybrid rogue access point (AP) detection
framework for commodity Wi-Fi networks. It is the first scheme that combines the distributed …

A measurement based rogue ap detection scheme

H Han, B Sheng, CC Tan, Q Li, S Lu - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing based technique that …