A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network

Authors

  • Sandip Patil COMPUTER, BVDUCOE, Pune, Maharashtra, India
  • Sandeep Vanjale BVDUCOE, Pune, Maharashtra, India

Keywords:

RAP, WLAN, Man In Middle Attack, Wireless security, Malicious Attacker

Abstract

Wireless access points are today popularly used for the convenience of mobile users. The growing acceptance of wireless local area networks (WLAN) presented different risks of wireless security attacks. Now a day's in many public places like bus stations, restaurant, malls etc. provides Wi-Fi connectivity to the users with free of cost. These public places having a device like wireless access point through which they provide service to the end users. The growing acceptance of wireless local area network causes a risk of wireless security attacks. The attacker creates a malicious access point to attract the users and perform attacks on user devices through WLAN. Malicious access point is one of the serious threats in wireless local area network. In this paper we have presented survey on recent different malicious access point detection solutions. We identified and compared their advantages and weaknesses.

References

Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Sanglu Lu, "A Timing-Based Scheme for Rogue AP Detection", 2011.

Taebeom Kim,Haemin Park, Hyunchul Jung, Heejo Lee,"Online Detection of Fake Access Points using Received Signal Strengths", 2012.

W.wei,S.Jaiswal,J.Kurose and D.Towsley,Identifying 802.11 traffic from passive measurments using iterative Bayesian inference in Proc. IEEE INFOCOM 06,2006.

L.Watkins,R.Beyah, and C. Corbett, Apassive apporach to rogue access point detection,in Proc. IEEE INFOCOM 06,2006.

Active User-side Evil Twin Access Point Detection Using Statistical Techniques Chao Yang, Yimin Song, and Guofei Gu, Member, IEEE.

Roth, V., Polak, W., Rieffel, E. Turner, T.,"Simple and effective defense against Evil Twin Access Points", WiSec’08, March 31–April 2, 2008, Virginia,USA, 2008.

S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection Probability Identification in Homogeneous System of Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Ajay M. Patel, Dr. A. R. Patel and Ms. Hiral R. Patel, “A Comparative Analysis of Data Mining Tools for Performance Mapping of WLAN Data”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 241 - 251, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Dipali D. Punwatkar and Kapil N. Hande, “A Review of Malicious Node Detection in Mobile Ad-hoc Networks”, International Journal of Computer Sciences & Engineering (IJCSE), Volume 2, Issue 2, 2014, pp. 65-69, ISSN 2347-2693 (Online).

Downloads

Published

2014-03-31

How to Cite

[1]
S. Patil and S. Vanjale, “A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 22–25, Mar. 2014.

Issue

Section

Survey Article