Open Access   Article Go Back

A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network

S. Patil1 , S. Vanjale2

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 22-25, Mar-2014

Online published on Mar 30, 2014

Copyright © S. Patil, S. Vanjale . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Patil, S. Vanjale, “A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.22-25, 2014.

MLA Style Citation: S. Patil, S. Vanjale "A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network." International Journal of Computer Sciences and Engineering 2.3 (2014): 22-25.

APA Style Citation: S. Patil, S. Vanjale, (2014). A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network. International Journal of Computer Sciences and Engineering, 2(3), 22-25.

BibTex Style Citation:
@article{Patil_2014,
author = {S. Patil, S. Vanjale},
title = {A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {22-25},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=61},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=61
TI - A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network
T2 - International Journal of Computer Sciences and Engineering
AU - S. Patil, S. Vanjale
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 22-25
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3764 3754 downloads 3697 downloads
  
  
           

Abstract

Wireless access points are today popularly used for the convenience of mobile users. The growing acceptance of wireless local area networks (WLAN) presented different risks of wireless security attacks. Now a day�s in many public places like bus stations, restaurant, malls etc. provides Wi-Fi connectivity to the users with free of cost. These public places having a device like wireless access point through which they provide service to the end users. The growing acceptance of wireless local area network causes a risk of wireless security attacks. The attacker creates a malicious access point to attract the users and perform attacks on user devices through WLAN. Malicious access point is one of the serious threats in wireless local area network. In this paper we have presented survey on recent different malicious access point detection solutions. We identified and compared their advantages and weaknesses.

Key-Words / Index Term

RAP, WLAN , Man In Middle Attack, Wireless security, Malicious Attacker

References

[1] Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Sanglu Lu, "A Timing-Based Scheme for Rogue AP Detection", 2011.
[2] Taebeom Kim,Haemin Park, Hyunchul Jung, Heejo Lee,"Online Detection of Fake Access Points using Received Signal Strengths", 2012.
[3] W.wei,S.Jaiswal,J.Kurose and D.Towsley,Identifying 802.11 traffic from passive measurments using iterative Bayesian inference in Proc. IEEE INFOCOM 06,2006.
[4] L.Watkins,R.Beyah, and C. Corbett, Apassive apporach to rogue access point detection,in Proc. IEEE INFOCOM 06,2006.
[5] Active User-side Evil Twin Access Point Detection Using Statistical Techniques Chao Yang, Yimin Song, and Guofei Gu, Member, IEEE.
[6] Roth, V., Polak, W., Rieffel, E. Turner, T.,"Simple and effective defense against Evil Twin Access Points", WiSec�08, March 31�April 2, 2008, Virginia,USA, 2008.
[7] S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, �Intrusion Detection Probability Identification in Homogeneous System of Wireless Sensor Network�, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 12 - 18, ISSN Print: 0976 � 6367, ISSN Online: 0976 � 6375.
[8] Ajay M. Patel, Dr. A. R. Patel and Ms. Hiral R. Patel, �A Comparative Analysis of Data Mining Tools for Performance Mapping of WLAN Data�, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 241 - 251, ISSN Print: 0976 � 6367, ISSN Online: 0976 � 6375.
[9] Dipali D. Punwatkar and Kapil N. Hande, �A Review of Malicious Node Detection in Mobile Ad-hoc Networks�, International Journal of Computer Sciences & Engineering (IJCSE), Volume 2, Issue 2, 2014, pp. 65-69, ISSN 2347-2693 (Online).