2020
DOI: 10.1186/s13638-020-01864-5
|View full text |Cite
|
Sign up to set email alerts
|

Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis

Abstract: Traditional rogue access-point (AP) detection mechanisms are employed in network administration to protect network infrastructure and organization; however, these mechanisms do not protect end users from connecting to a rogue-AP. In this paper, a rogue-AP detection technique on the mobile-user side is proposed. By using a simple method involving walking, the round-trip time (RTT) and the modulation and coding scheme values are obtained, and a more accurate transmission rate for particular RTT values is thereby… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Furthermore, the particular probe packets are easily detected by an experienced attacker who can ignore the probe packets to bypass the detection of Wi-Fi. The WPFD does not have this problem On the other hand, in the previous research on general rogue APs there is a summary or a discussion like Sweta et al [26], and for a round-trip time measurement with a machine learning algorithm, in Songrit et al [27]. Furthermore, as mentioned above, there are also algorithms like Ganesh et al, which is a standard algorithm of the LAN network environment [28], and Neha et al [29], which is a hash algorithm focused on WLAN security.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the particular probe packets are easily detected by an experienced attacker who can ignore the probe packets to bypass the detection of Wi-Fi. The WPFD does not have this problem On the other hand, in the previous research on general rogue APs there is a summary or a discussion like Sweta et al [26], and for a round-trip time measurement with a machine learning algorithm, in Songrit et al [27]. Furthermore, as mentioned above, there are also algorithms like Ganesh et al, which is a standard algorithm of the LAN network environment [28], and Neha et al [29], which is a hash algorithm focused on WLAN security.…”
Section: Related Workmentioning
confidence: 99%
“…The IEEE 802.11 is specifically designed for wireless connections, the first 802.11 has been developed in 1997 and is still being improved on. This type of wireless standard is used with frequencies 2.4, 5, 60 GHz, the Evil Twin Wi-Fi attack typically targets this standard [6][7][8][9]. To detect evil-twin attack, a real-time client-side detection technique is proposed [7].…”
Section: Introductionmentioning
confidence: 99%
“…To detect evil-twin attack, a real-time client-side detection technique is proposed [7]. A rogue Access Point (AP) detection technique based on the round-trip time (RTT) on the mobile-user side is proposed [8]. A Convolutional Neural Network (CNN) based Evil-Twin Attack (ETA) detection technique is proposed which uses the preamble of the WiFi signal as the feature and uses it to train a CNN based classification model [9].…”
Section: Introductionmentioning
confidence: 99%