Rogue access point detection: Taxonomy, challenges, and future directions

B Alotaibi, K Elleithy - Wireless Personal Communications, 2016 - Springer
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …

[KİTAP][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

A timing-based scheme for rogue AP detection

H Han, B Sheng, CC Tan, Q Li… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …

Who is pee** at your passwords at Starbucks?—To catch an evil twin access point

Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …

Active user-side evil twin access point detection using statistical techniques

C Yang, Y Song, G Gu - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …

A hybrid rogue access point protection framework for commodity Wi-Fi networks

L Ma, AY Teymorian, X Cheng - IEEE INFOCOM 2008-The 27th …, 2008 - ieeexplore.ieee.org
We develop a practical and comprehensive hybrid rogue access point (AP) detection
framework for commodity Wi-Fi networks. It is the first scheme that combines the distributed …

A measurement based rogue ap detection scheme

H Han, B Sheng, CC Tan, Q Li, S Lu - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing based technique that …

Securing SSL certificate verification through dynamic linking

A Bates, J Pletcher, T Nichols, B Hollembaek… - Proceedings of the …, 2014 - dl.acm.org
Recent discoveries of widespread vulnerabilities in the SSL/TLS protocol stack, particular
with regard to the verification of server certificates, has left the security of the Internet's …

Cetad: Detecting evil twin access point attacks in wireless hotspots

H Mustafa, W Xu - 2014 IEEE Conference on Communications …, 2014 - ieeexplore.ieee.org
Wireless hotspots allow users to use Internet via Wi-Fi interface, and many shops, cafés,
parks, and airports provide free wireless hotspot services to attract customers. However …

Detection of man‐in‐the‐middle attacks using physical layer wireless security techniques

L Wang, AM Wyglinski - Wireless Communications and Mobile …, 2016 - Wiley Online Library
Compared with a wired network, a wireless network is not protected by the cable
transmission medium. Information is broadcasted over the air and it can be intercepted by …