2021
DOI: 10.11591/ijeecs.v23.i3.pp1527-1537
|View full text |Cite
|
Sign up to set email alerts
|

The rogue access point identification: a model and classification review

Abstract: Most people around the world make use of public Wi-Fi hotspots, as their daily routine companion in communication. The access points (APs) of public Wi-Fi are easily deployed by anyone and everywhere, to provide hassle-free Internet connectivity. The availability of Wi-Fi increases the danger of adversaries, taking advantages of sniffing the sensitive data. One of the most serious security issues encountered by Wi-Fi users, is the presence of rogue access points (RAP). Several studies have been published regar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 91 publications
(114 reference statements)
0
1
0
Order By: Relevance
“…Rogue Access Point (RAP) 1083 (2022) 012091 IOP Publishing doi:10.1088/1755-1315/1083/1/012091 2 is one of the adversary's malicious activities. RAP is a wireless AP that has been deployed on a secure network without explicit authorization from a network administrator, or that was created to allow a cracker to conduct a man-in-the-middle operation to intercept communication between active devices on a network [7], [8]. A traditional RAP identification strategy can be conducted by using a unique identifier, such as a MAC Address or SSID of the AP itself.…”
Section: Introductionmentioning
confidence: 99%
“…Rogue Access Point (RAP) 1083 (2022) 012091 IOP Publishing doi:10.1088/1755-1315/1083/1/012091 2 is one of the adversary's malicious activities. RAP is a wireless AP that has been deployed on a secure network without explicit authorization from a network administrator, or that was created to allow a cracker to conduct a man-in-the-middle operation to intercept communication between active devices on a network [7], [8]. A traditional RAP identification strategy can be conducted by using a unique identifier, such as a MAC Address or SSID of the AP itself.…”
Section: Introductionmentioning
confidence: 99%