Abstract
The threat of rogue access points (APs) has attracted significant attentions from both industrial and academic researchers. This paper considers a category of rogue APs that are set up in moving vehicles to lure users. Usually, rogue access points are on the moving vehicles that can keep close distance to the users at all time, thus the adversary has more time to expose private information of users. This paper proposes a practical detecting rogue APs algorithm based on received signal strength (RSS), which calculates the distance between the user and the APs to defend against the rogue APs. The paper also develops a relative position algorithm to find the position of AP. If the position of AP is on the road rather than on the road side, the algorithm suspects that the AP is rogue AP. In this paper, we also have implemented the detection algorithm on real vehicular environments and also have evaluated the performance of the proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wu, Y., Zhu, Y.: CCR: Capacity-constrained replication for data delivery in vehicular networks. In: INFOCOM, pp. 2580–2588 (2013)
Guan, X., Huang, Y., Cai, Z., Ohtsuki, T.: Intersection-based forwarding protocol for vehicular ad hoc networks. Telecommunication Systems. 10.1007/s11235-015-9983-y (2015)
Cheng, S., Cai, Z., Li, J.: Curve query processing in wireless sensor networks. IEEE Trans. Veh. Technol., 1–12 (2014)
Farnoud, F., Valaee, S.: Reliable broadcast of safety messages in vehicular ad hoc networks. In: INFOCOM, pp. 226–234 (2009)
Zhu, H., et al.: ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks. In: INFOCOM, pp. 2832–2840 (2013)
Watkins, L., et al.: A passive approach to rogue access point detection. In: GLOBECOM, pp. 355–360 (2007)
Han, H., Sheng, B.: A measurement based rogue ap detection scheme. In: INFOCOM, pp. 1593–1601 (2009)
Yin, H., Chen, G.: Detecting protected layer-3 rogue aps. In: BROADNEtS, pp. 449–458 (2007)
Shetty, S., Song, M.: Rogue access point detection by analyzing network traffic characteristics. In: MILCOM, pp. 1–7 (2007)
Cheng, L., et al.: Doppler spread and coherence time of rural and highway vehicle-to-vehicle channels at 5.9 GHz. In: GLOBECOM, pp. 1–6 (2008)
Camp, J., et al.: Modulation rate adaptation in urban and vehicular environments: cross-layer implementation and experimental evaluation. IEEE/ACM Trans. Netw. 18(6), 1949–1962 (2010)
Liu, C., Yu, J.: Rogue access point based Dos attacks against 802.11 WLANs. In: AICT, pp. 271–276 (2008)
Chandra, R., et al.: A location-based management system for enterprise wireless lans. In: NSDI (2007)
Air defence. www.airdefence.net
Air magnet. www.airmagnet.com
Bahl, P., et al.: Enhancing the security of corporate Wi-Fi networks using DAIR. In: MobiSys (2006)
Gao, K., et al.: A passive approach to wireless device fingerprinting. In: DSN, pp. 383–392 (2010)
Han, H., et al.: Defending against vehicular rogue APs. In: INFOCOM, pp. 1665–1673 (2011)
Brik, V., et al.: Wireless device identification with radiometric signatures. In: MOBICOM (2008)
Sheng, Y., Tan, K.: Detecting 802.11 MAC layer spoofing using received signal strength. In: INFOCOM, pp. 383–392 (2008)
Jana, S., Kasera, S.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: TMC, pp. 449–462 (2010)
Ling, Z., et al.: Novel packet size-based covert channel attacks against anonymizer. IEEE Trans. Comput. 62, 2411–2426 (2013)
Long, T., et al.: Optimization of RSSI algorithm in wireless sensor network. In: Computer System Application (2013)
TelosB Ddatasheet. http://www.willow.co.uk/html/telosb_mote_platform.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Qu, H., Guo, L., Zhang, W., Li, J., Ren, M. (2015). Rogue Access Point Detection in Vehicular Environments. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)