A novel approach for elimination of rogue access point in wireless network

S Vanjale, PB Mane - 2014 Annual IEEE India Conference …, 2014 - ieeexplore.ieee.org
Now a day's wireless LAN is widely used in many public spaces. Wireless access points
expand wired network. It provides more flexibility to the users. There is a big risk that users …

[KSIĄŻKA][B] ICDSMLA 2019

A Kumar, M Paprzycki, VK Gunjan - 2020 - Springer
This book gathers selected high-impact articles from the 1st International Conference on
Data Science, Machine Learning & Applications 2019. It highlights the latest developments …

Rogue AP detection using similarity of backbone delay fluctuation histogram

Z Zhang, H Hasegawa, Y Yamaguchi… - 2020 International …, 2020 - ieeexplore.ieee.org
Nowadays, wireless LAN service has been taken for granted by everyone. However, there is
an increase in the occurrence of cyber threats to wireless LAN. For example, one attack …

A Survey on the Internet of Things: Applications, Challenges and Opportunities with India Perspective

S Thite, D Thakore - ICDSMLA 2019: Proceedings of the 1st International …, 2020 - Springer
Extensive research efforts are going on to contribute to the Internet of Things (IoT)
application development. IoT will create network of “Things” capable of communicating and …

Wireless lan intrusion detection and prevention system for malicious access point

SB Vanjale, PB Mane, SV Patil - 2015 2nd International …, 2015 - ieeexplore.ieee.org
In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to
goodness APs for adaptation. Existing malicious AP detection methods analyze wireless …

SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications

S Thite, J NaveenKumar - International Journal of …, 2022 - inderscienceonline.com
Cyber physical systems (CPS) is a ubiquitous concept where objects are connected to the
internet and equipped with an ability to sense physical medium and transmit data through …

Securing Wireless Multimedia Objects Through Machine Learning Techniques in Wireless Sensor Networks

R Ahuja, AK Agarwal, M Sharma… - Smart Sensor Networks …, 2021 - taylorfrancis.com
This chapter illustrated the various techniques to secure multimedia objects through
machine learning techniques in a wireless sensor network. Multimedia objects are easily …

[PDF][PDF] WIRELESS LAN INTRUSION DETECTION BY USING STATISTICAL TIMING APPROACH

Today as we all are habitual of using internet through wired or wireless LAN Networks, but
using internet through Wireless LAN becomes harder as the threat of unauthorized access …