EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi

P Shrivastava, MS Jamal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Spoofing the identity of a WiFi access point (AP) is trivial. Consequently, an adversary can
impersonate the legitimate AP (LAP) by mimicking its network name (SSID) and MAC …

PRAPD: A novel received signal strength–based approach for practical rogue access point detection

W Wu, X Gu, K Dong, X Shi… - International Journal of …, 2018 - journals.sagepub.com
Rogue access point attack is one of the most important security threats for wireless local
networks and has attracted great attention from both academia and industry. Utilizing …

Catch me if you can: Rogue access point detection using intentional channel interference

R Jang, J Kang, A Mohaisen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we introduce a powerful hardware-based rogue access point (PrAP), which
can relay back and forth traffic between a legitimate AP and a wireless station, and act as a …

A joint rogue access point localization and outlier detection scheme leveraging sparse recovery technique

Q Pu, JKY Ng, M Zhou, J Wang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the pervasive deployments of Access Point (AP) in Wireless Local Area Network
(WLAN), rogue AP has emerged as such a large threat to user's privacy, that it is expected to …

Taxonomy and future threat of rogue access point for wireless network

KC Patel, A Patel - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
Wireless network communication is an enormous and vast area of research. Many
companies and organizations, related to wireless security have struggled due to the narrow …

Rogue access point: The WLAN threat

KC Patel, A Patel - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Due to the wireless airspace's limited size and capacity and its restriction to network teams,
numerous businesses and organisations involved in wireless security have fought and …

[PDF][PDF] The rogue access point identification: a model and classification review

D DA Arisandi… - The Indonesian …, 2021 - pdfs.semanticscholar.org
Most people around the world make use of public Wi-Fi hotspots, as their daily routine
companion in communication. The access points (APs) of public Wi-Fi are easily deployed …

Detecting Evil-Twin attack with the crowd sensing of landmark in physical layer

C Wang, L Zhu, L Gong, Z Liu, X Mo, W Yang… - … and Architectures for …, 2018 - Springer
With the popularity of mobile computing, WiFi has become one of the essential technologies
for people to access the Internet, and WiFi security has also become a major threat for …

Digitalseal: a transaction authentication tool for online and offline transactions

C Jung, J Kang, A Mohaisen… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
We introduce DigitalSeal, a transaction authentication tool that works in both online and
offline use scenarios. Digi-talSeal is a digital scanner that reads transaction information sent …

[PDF][PDF] Securing the internet of things: A machine learning approach

A Mohaisen, J Kim - 2018 IEEE ICC Tutorials, 2018 - cs.ucf.edu
The Internet of Things, IoT, is expected to revolutionize our lives, and their security of
paramount importance. Machine learning, on the other hand, has found many applications …