Abstract
This paper deals with the security of wireless networks such as Google Wi-Fi. We have considered the rogue mobile access points which impersonate legitimate roadside access points to attract users to connect to them. Since these rogue access points are mobile, they are able to make connection with the users for a long time which favors them to make attack on users and steal the important information. Since the rogue access is in moving state, it will communicate to different–different access point based on received signal strength so if the user want to detect the access point, it will have very less time to detect it because after some time till it get response from the access point the vehicle will have been moved to other location and connect to another access point. We have proposed an algorithm which is based on two parameters—one is the speed of vehicle and other is received signal strength. Our algorithm state that the rate of change in the value of received signal strength will be proportional to the speed of the vehicle. This algorithm does not require any extra hardware such as the GPS system and also does not require any modification to existing network.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11277-014-2256-3/MediaObjects/11277_2014_2256_Fig6_HTML.gif)
Similar content being viewed by others
References
Google Mountain View. http://wifi.google.com
Bychkovsky, V., Hull, B., Miu, A. K., Balakrishnan, H., & Madden, S. (2006). A measurement study of vehicular internet access using in situ Wi-Fi networks. In 12th ACM MOBICOM Conference, Los Angeles, CA.
Ott, J., & Kutscher, D. (2004). Drive-thru internet: IEEE 802.11b for “automobile” users. In INFOCOM.
Jana, S., & Kasera, S. (2008). On fast and accurate detection of unauthorized wireless access points using clock skews. In Mobicom.
Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In Infocom.
Brik, V., Banerjee, S., Gruteser, M., & Oh, S. (2008). Wireless device identification with radiometric signatures. In Mobicom.
Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2009). A measurement based rogue AP detection scheme. In The 28th IEEE international conference on computer communications, Rio de Janeiro, Brazil.
Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2011). A timing-based scheme for rogue AP detection. IEEE Transactions on Parallel and Distributed Systems, 22, 1912–1925.
Yin, H., Chen, G., & Wang, J. (2007). Detecting protected layer-3 rogue APs. In Broadnets.
Wei, W., Suh, K., Wang, B., Gu, Y., Kurose, J., & Towsley, D. (2007). Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In IMC.
Branch, J., Petroni, N, Jr, Van Doorn, L., & Safford, D. (2004). Autonomic 802.11 wireless LAN security auditing. IEEE Security & Privacy, 2, 56–65.
Wavelink. www.wavelink.com/downloads/pdf/wlmobilemanager_wp_rogueap
Bahl, P., Padhye, J., Ravindranath, L., Singh, M., Wolman, A., & Zill, B. (2005). DAIR: A framework for managing enterprise wireless networks using desktop infrastructure. In The Proceedings of ACM HOTNETS.
Air Defense. www.airdefense.net
Air Wave. www.airwave.com/airwave_rogue_detection
Han, H., Xu, F., Tan, C. C., Zhang, Y., & Li, Q. (2011). Defending against vehicular rogue APs. In INFOCOM. IEEE.
Le, T. M., Liu, R. P., & Hedley, M. (2012). Rogue access point detection and localization. In International symposium on personal, indoor and mobile radio communications. IEEE.
Acknowledgments
The authors are very thankful to ABV-Indian Institute of Information Technology and Management (ABV-IIITM) Gwalior, for providing the research facilities.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yadav, K.K., Tapaswi, S. Vehicular Rogue Access Point Detection Using Speed of Vehicle. Wireless Pers Commun 82, 849–860 (2015). https://doi.org/10.1007/s11277-014-2256-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-2256-3