Skip to main content

Advertisement

Log in

Vehicular Rogue Access Point Detection Using Speed of Vehicle

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper deals with the security of wireless networks such as Google Wi-Fi. We have considered the rogue mobile access points which impersonate legitimate roadside access points to attract users to connect to them. Since these rogue access points are mobile, they are able to make connection with the users for a long time which favors them to make attack on users and steal the important information. Since the rogue access is in moving state, it will communicate to different–different access point based on received signal strength so if the user want to detect the access point, it will have very less time to detect it because after some time till it get response from the access point the vehicle will have been moved to other location and connect to another access point. We have proposed an algorithm which is based on two parameters—one is the speed of vehicle and other is received signal strength. Our algorithm state that the rate of change in the value of received signal strength will be proportional to the speed of the vehicle. This algorithm does not require any extra hardware such as the GPS system and also does not require any modification to existing network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Google Mountain View. http://wifi.google.com

  2. Bychkovsky, V., Hull, B., Miu, A. K., Balakrishnan, H., & Madden, S. (2006). A measurement study of vehicular internet access using in situ Wi-Fi networks. In 12th ACM MOBICOM Conference, Los Angeles, CA.

  3. Ott, J., & Kutscher, D. (2004). Drive-thru internet: IEEE 802.11b for “automobile” users. In INFOCOM.

  4. Jana, S., & Kasera, S. (2008). On fast and accurate detection of unauthorized wireless access points using clock skews. In Mobicom.

  5. Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In Infocom.

  6. Brik, V., Banerjee, S., Gruteser, M., & Oh, S. (2008). Wireless device identification with radiometric signatures. In Mobicom.

  7. Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2009). A measurement based rogue AP detection scheme. In The 28th IEEE international conference on computer communications, Rio de Janeiro, Brazil.

  8. Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2011). A timing-based scheme for rogue AP detection. IEEE Transactions on Parallel and Distributed Systems, 22, 1912–1925.

    Article  Google Scholar 

  9. Yin, H., Chen, G., & Wang, J. (2007). Detecting protected layer-3 rogue APs. In Broadnets.

  10. Wei, W., Suh, K., Wang, B., Gu, Y., Kurose, J., & Towsley, D. (2007). Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In IMC.

  11. Branch, J., Petroni, N, Jr, Van Doorn, L., & Safford, D. (2004). Autonomic 802.11 wireless LAN security auditing. IEEE Security & Privacy, 2, 56–65.

    Article  Google Scholar 

  12. Wavelink. www.wavelink.com/downloads/pdf/wlmobilemanager_wp_rogueap

  13. Bahl, P., Padhye, J., Ravindranath, L., Singh, M., Wolman, A., & Zill, B. (2005). DAIR: A framework for managing enterprise wireless networks using desktop infrastructure. In The Proceedings of ACM HOTNETS.

  14. www.highwalltech.com/products.cfm?menu=hwsent&pa ge=hwsent

  15. Air Defense. www.airdefense.net

  16. Air Wave. www.airwave.com/airwave_rogue_detection

  17. Han, H., Xu, F., Tan, C. C., Zhang, Y., & Li, Q. (2011). Defending against vehicular rogue APs. In INFOCOM. IEEE.

  18. Le, T. M., Liu, R. P., & Hedley, M. (2012). Rogue access point detection and localization. In International symposium on personal, indoor and mobile radio communications. IEEE.

Download references

Acknowledgments

The authors are very thankful to ABV-Indian Institute of Information Technology and Management (ABV-IIITM) Gwalior, for providing the research facilities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kaushal Kishor Yadav.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, K.K., Tapaswi, S. Vehicular Rogue Access Point Detection Using Speed of Vehicle. Wireless Pers Commun 82, 849–860 (2015). https://doi.org/10.1007/s11277-014-2256-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2256-3

Keywords

Navigation