The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018 IEEE 4th International Conference on Computer and Communications (ICCC) 2018
DOI: 10.1109/compcomm.2018.8780768
|View full text |Cite
|
Sign up to set email alerts
|

Fake Access Point Localization Based on Optimal Reference Points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Selvarathinam et al [43] enhanced the current IDS, with discrete event system (DES) as antifailure of RAP detection, while Kumar and Paul [44] were prone to leveraging the previous AP information value, as the identifier in determining the RAP surrounding the area. Another preventing solution from Xu et al [45] was by collecting and processing the RSSI data and distance measurement, to gain an optimal reference point of RAP. Chatfield and Haddad [46] proposed a novel RAP identification technique using phase error detection in CSI feature.…”
Section: Ap Profilingmentioning
confidence: 99%
See 1 more Smart Citation
“…Selvarathinam et al [43] enhanced the current IDS, with discrete event system (DES) as antifailure of RAP detection, while Kumar and Paul [44] were prone to leveraging the previous AP information value, as the identifier in determining the RAP surrounding the area. Another preventing solution from Xu et al [45] was by collecting and processing the RSSI data and distance measurement, to gain an optimal reference point of RAP. Chatfield and Haddad [46] proposed a novel RAP identification technique using phase error detection in CSI feature.…”
Section: Ap Profilingmentioning
confidence: 99%
“…While agent deployment, which is an admin-side approach, has good prospects for the industrial application, as it allows automation in detecting RAP without a significant role from the client, as implemented by several network companies. [6], [21], [24], [25], [27], [29], [30], [75], [36], [38], [39], [40], [41], [42], [43], [45], [46], [47], [48], [49], [31] Packet behaviour MAC, NUL, PHY [51], [53], [56], [57], [58], [59], [62],…”
Section: Agent Deploymentmentioning
confidence: 99%