Abstract
Traditional rogue access-point (AP) detection mechanisms are employed in network administration to protect network infrastructure and organization; however, these mechanisms do not protect end users from connecting to a rogue-AP. In this paper, a rogue-AP detection technique on the mobile-user side is proposed. By using a simple method involving walking, the round-trip time (RTT) and the modulation and coding scheme values are obtained, and a more accurate transmission rate for particular RTT values is thereby calculated. Further, the cleansed data are classified using the k-means method and the cumulative distribution function for the detection process. The results demonstrate that a rogue-AP can be detected with an F-measure value of up to 0.9. In the future, the proposed algorithm can be implemented as an application installed on mobile devices so that nontechnical users can detect rogue-APs.
Highlights
Wireless network communication, such as 3G, 4G, and Wi-Fi, serves as a basic infrastructure for Internet access
The mobile phone of the adversary is used as a rogue-access point (AP) by broadcasting the same service set identifier (SSID) as that of the legitimate AP installed on the café ceiling
The algorithm revealed that a rogue-AP was detected because the mixture of 1-hop and 2-hop connections causes the value of Ŵ to be greater than 2, as derived from the test results
Summary
Wireless network communication, such as 3G, 4G, and Wi-Fi, serves as a basic infrastructure for Internet access. A client-side rogue-AP detection method is proposed It uses a simple walking-related mechanism to obtain the round-trip time (RTT) as well as the modulation and coding scheme (MCS). A user-side probe-walking technique involving simple RTT measurement and analysis is proposed, whereby users can protect themselves from unintentionally connecting to rogue-APs. For a particular location, a user can receive only one data instant for each current AP connection. The simple RTT on a type 3 rogue-AP is analyzed by sending ping packets from a user device to an internal dedicated server in the LAN. In Algorithm 1, a user performs three short and some long walks for collecting data from different locations.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Wireless Communications and Networking
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.