EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi
P Shrivastava, MS Jamal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Spoofing the identity of a WiFi access point (AP) is trivial. Consequently, an adversary can
impersonate the legitimate AP (LAP) by mimicking its network name (SSID) and MAC …
impersonate the legitimate AP (LAP) by mimicking its network name (SSID) and MAC …
PRAPD: A novel received signal strength–based approach for practical rogue access point detection
Rogue access point attack is one of the most important security threats for wireless local
networks and has attracted great attention from both academia and industry. Utilizing …
networks and has attracted great attention from both academia and industry. Utilizing …
Catch me if you can: Rogue access point detection using intentional channel interference
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which
can relay back and forth traffic between a legitimate AP and a wireless station, and act as a …
can relay back and forth traffic between a legitimate AP and a wireless station, and act as a …
A joint rogue access point localization and outlier detection scheme leveraging sparse recovery technique
With the pervasive deployments of Access Point (AP) in Wireless Local Area Network
(WLAN), rogue AP has emerged as such a large threat to user's privacy, that it is expected to …
(WLAN), rogue AP has emerged as such a large threat to user's privacy, that it is expected to …
Taxonomy and future threat of rogue access point for wireless network
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …
companies and organizations, related to wireless security have struggled due to the narrow …
Rogue access point: The WLAN threat
Due to the wireless airspace's limited size and capacity and its restriction to network teams,
numerous businesses and organisations involved in wireless security have fought and …
numerous businesses and organisations involved in wireless security have fought and …
[PDF][PDF] The rogue access point identification: a model and classification review
D DA Arisandi… - The Indonesian …, 2021 - pdfs.semanticscholar.org
Most people around the world make use of public Wi-Fi hotspots, as their daily routine
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …
Detecting Evil-Twin attack with the crowd sensing of landmark in physical layer
With the popularity of mobile computing, WiFi has become one of the essential technologies
for people to access the Internet, and WiFi security has also become a major threat for …
for people to access the Internet, and WiFi security has also become a major threat for …
Digitalseal: a transaction authentication tool for online and offline transactions
We introduce DigitalSeal, a transaction authentication tool that works in both online and
offline use scenarios. Digi-talSeal is a digital scanner that reads transaction information sent …
offline use scenarios. Digi-talSeal is a digital scanner that reads transaction information sent …
[PDF][PDF] Securing the internet of things: A machine learning approach
The Internet of Things, IoT, is expected to revolutionize our lives, and their security of
paramount importance. Machine learning, on the other hand, has found many applications …
paramount importance. Machine learning, on the other hand, has found many applications …