Detecting Unauthorized Access Points in Wireless Environment
Keywords:
The concept of mobility for end users has intro-duced, both security risk and an exponential growth of base stations, and Wireless Access PointsAbstract
The exponential growth in wireless environment ensures extended mobility to the end-users. Mobility provides different levels of flexibity in operation but induces certain security risks. The security risks exist mainly in the form of unauthorized or fake access points to which end users can connect. The illegitimate connections could lead to eavesdropping on the end users and initiating security attacks (such as evil twins exploit). In this paper, we propose a method which uses label-hopping technique to detect fake wireless Access Point (AP). Once detected, such fake AP could be identified and removed from the wireless environment. We use Wireless Local Area Network (WLAN) based environment, as an example for applying the proposed technique. The proposed technique is extensible to mobile wireless networks such as 4th=5th generation mobile
References
[1] N. Sathya Narayanan, Milan Patnaik, V. Kamakoti, ProMAC: A proactive model predictive control based MAC protocol for cognitive radio vehicular networks, Computer Commu-nications, Volume 93, 2016, Pages 27-38,ISSN0140-3664, https://doi.org/10.1016/j.comcom.2016.05.012.
[2] K. Bauer, H. Gonzales and D. McCoy, Mitigating Evil Twin Attacks in 802.11, IEEE International Performance, Com-puting and Communications Conference, Austin, Texas, 2008, pp. 513-516. doi: 10:1109/PCCC.2008.4745081
[3] M. Martellini, A. Stanislav, S Gaycken, and C. Wilson, Information Security of Highly Critical Wireless Networks, Springer International Publishing, 2017, pp. 11-15. doi: 10.1007=978-3-319-52905-9 4
[4] D. Pleskonjic, S. Omerovic, and S. Tomazic, Network Sys-tems Intrusion: Concept, Detection, Decision, and Prevention, IPSI BgD Transactions on Internet Research, vol. 3(1), 2007.
[5] Anik Shah, Animesh Shah, ”A Survey: Wireless Lan Security Protocols”, IJECS, vol. 4, no. 3, pp. 10968-10971, March 2015.
[6] U. Deshpande, T. Henderson, D. Kotz. Channel sampling strategies for monitoring wireless networks., In: Proceedings of the second workshop on wireless network measurements, Boston, April 2006.
[7] S Raman, B Venkat, G Raina, Mitigating Some Security Attacks in MPLS-VPN Model “C”, International Journal on Advances in Networks and Services, vol. 5(3 4),2012.
[8] J.Lawrence Carter, M. N.Wegman, Universal classes of hash functions Elseveir Journal of Computer and System Sciences, vol. 8(2), pp. 143154, 1979.
[9] V Boyko, P MacKenzie, and S Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology — EUROCRYPT 2000, Springer, Ed.B Preneel, pp.156171, 2000.
[10] D Wang, P Wang, Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards., In: Desmedt Y. (eds) Information Security. Lecture Notes in Computer Science, vol 7807. Springer, 2015.
[11] T H Cormen, C E Leiserson, R L Rivest, C Stein, Introduction algorithms, MIT press, 2009.
[12] Ting, M T David, O Hussain, and G LaRoche, Systems and methods for multi-factor authentication, U.S. Patent 9; 118; 656, 2015.
[13] N Karapanos, M Claudio Marforio, S Claudio and C Srdjan, Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound,In USENIX Security Symposium, pp. 483 498,2015.
[14] Romero, Francisco Javier Dominguez, Kyriakos Exadactylos, and Andrea De Pasquale. ”Cell barring in a cellular communi-cation network.” U.S. Patent 8,718,655, issued May 6, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
