Abstract
Wireless LANs are an integral part of todays globalized economy. WLANs are growing and so are their threats. The main security threat in a wireless network is a malicious or rogue access point (RAP). It is also observed that out of total available access points (AP) on the network, almost 20% APs are unauthorized. Existing research methods use diverse parameters such as clock skew, wireless traffic monitoring, encryption, authorization, timing based approach, RSS analysis, bottleneck bandwidth analysis, and sequential hypothesis test. The limitations of the existing methods include; weak clock skew solution assumption; variable inter packet arrival time; mobile agent code cannot be installed on all nodes; MAC and SSID address can be spoofed; variable received signal strength; the system will not work properly if central server is down. These limitations have motivated us to develop a multi parameter based technique to improve the detection of RAP in WLAN. From the results it is observed that the developed multi-parameter based method shows improvement in terms of time required for detecting RAP. Detection time is improved by 37.33%, in comparison to the different methods.






Similar content being viewed by others
References
Han, H., Xu, F., Tan, C. C., Zhang, Y., & Li, Q. (2011). Defending aganist vechicluar rogue Aps. In IEEE Infocom 2011.
Nikbakhsh, S., Manaf, A., Zamani, M., & Janbeglou, M. (2012). A novel approach for rogue access point detection on the client side. In: Proceedings of the international conference on advanced information networking and applications workshops.
Milliken, J., Selis, V., & Marshall, A. (2013). Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security 2013 a Springer Open Journal, 2013, 2.
Le, T. M., Liu, R. P., & Rogue, M. H. (2012). Access point detection and localization published in IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC). INSPEC Accession Number: 13167039.
Reising, D. R., Temple, M. A., & Jackson, J. A. (2015). Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Transactions on Information Forensics and Security, 10(6), 1180.
Beyah, R., & Venkataraman, A. (2011). Rogue-access-point detection: Challenges, solutions, and future directions. IEEE Security and Privacy, 9(5), 5661.
Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2011). A timing based scheme for rogue AP detection. In Proceedings of the IEEE transactions on parallel and distributed systems.
Nyathi, T., & Ndlovu, S. (2014). Beacon frame manipulation to mitigate rogue access points: Case of android smartphone rogue access points COMPUSOFT. An International Journal of Advanced Computer Technology, 3(2), 576.
Yang, J., Chen, Y., Trappe, W., & Cheng, J. (2013). Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Computing. doi:10.1109/TPDS.2012.104.
Kim, T., Park, H., Jung, H., & Lee, H. (2012). Online detection of fake access points using received signal strength. In Proceedings of the IEEE 75th international conference on vehicular technology.
Yang, C., Song, Y., & Guofei, G. (2012). Active user-side Evil Twin access point detection using statistical techniques. IEEE Transactions on Information Forensics and Security, 7(5), 1638–1651.
Shankar Sriram, V. S., Sahoo, G., Agrawal, & Krishna K. (2010). Detecting and eliminating rogue access points in IEEE-802.11 WLAN: A multi-agent sourcing methodology. In: 2010 IEEE 2nd international published in advance computing conference (IACC). INSPEC Accession Number: 11155873.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vanjale, S.B., Mane, P.B. Multi Parameter Based Robust and Efficient Rogue AP Detection Approach. Wireless Pers Commun 98, 139–156 (2018). https://doi.org/10.1007/s11277-017-4860-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4860-5