Skip to main content
Log in

Multi Parameter Based Robust and Efficient Rogue AP Detection Approach

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless LANs are an integral part of todays globalized economy. WLANs are growing and so are their threats. The main security threat in a wireless network is a malicious or rogue access point (RAP). It is also observed that out of total available access points (AP) on the network, almost 20% APs are unauthorized. Existing research methods use diverse parameters such as clock skew, wireless traffic monitoring, encryption, authorization, timing based approach, RSS analysis, bottleneck bandwidth analysis, and sequential hypothesis test. The limitations of the existing methods include; weak clock skew solution assumption; variable inter packet arrival time; mobile agent code cannot be installed on all nodes; MAC and SSID address can be spoofed; variable received signal strength; the system will not work properly if central server is down. These limitations have motivated us to develop a multi parameter based technique to improve the detection of RAP in WLAN. From the results it is observed that the developed multi-parameter based method shows improvement in terms of time required for detecting RAP. Detection time is improved by 37.33%, in comparison to the different methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Han, H., Xu, F., Tan, C. C., Zhang, Y., & Li, Q. (2011). Defending aganist vechicluar rogue Aps. In IEEE Infocom 2011.

  2. Nikbakhsh, S., Manaf, A., Zamani, M., & Janbeglou, M. (2012). A novel approach for rogue access point detection on the client side. In: Proceedings of the international conference on advanced information networking and applications workshops.

  3. Milliken, J., Selis, V., & Marshall, A. (2013). Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security 2013 a Springer Open Journal, 2013, 2.

    Google Scholar 

  4. Le, T. M., Liu, R. P., & Rogue, M. H. (2012). Access point detection and localization published in IEEE 23rd international symposium on personal, indoor and mobile radio communications-(PIMRC). INSPEC Accession Number: 13167039.

  5. Reising, D. R., Temple, M. A., & Jackson, J. A. (2015). Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Transactions on Information Forensics and Security, 10(6), 1180.

    Article  Google Scholar 

  6. Beyah, R., & Venkataraman, A. (2011). Rogue-access-point detection: Challenges, solutions, and future directions. IEEE Security and Privacy, 9(5), 5661.

    Article  Google Scholar 

  7. Han, H., Sheng, B., Tan, C., Li, Q., & Lu, S. (2011). A timing based scheme for rogue AP detection. In Proceedings of the IEEE transactions on parallel and distributed systems.

  8. Nyathi, T., & Ndlovu, S. (2014). Beacon frame manipulation to mitigate rogue access points: Case of android smartphone rogue access points COMPUSOFT. An International Journal of Advanced Computer Technology, 3(2), 576.

    Google Scholar 

  9. Yang, J., Chen, Y., Trappe, W., & Cheng, J. (2013). Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Computing. doi:10.1109/TPDS.2012.104.

    Google Scholar 

  10. Kim, T., Park, H., Jung, H., & Lee, H. (2012). Online detection of fake access points using received signal strength. In Proceedings of the IEEE 75th international conference on vehicular technology.

  11. Yang, C., Song, Y., & Guofei, G. (2012). Active user-side Evil Twin access point detection using statistical techniques. IEEE Transactions on Information Forensics and Security, 7(5), 1638–1651.

    Article  Google Scholar 

  12. Shankar Sriram, V. S., Sahoo, G., Agrawal, & Krishna K. (2010). Detecting and eliminating rogue access points in IEEE-802.11 WLAN: A multi-agent sourcing methodology. In: 2010 IEEE 2nd international published in advance computing conference (IACC). INSPEC Accession Number: 11155873.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep B. Vanjale.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vanjale, S.B., Mane, P.B. Multi Parameter Based Robust and Efficient Rogue AP Detection Approach. Wireless Pers Commun 98, 139–156 (2018). https://doi.org/10.1007/s11277-017-4860-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4860-5

Keywords

Navigation