Abstract
These days, wireless networks have become an indispensable environment in our life. Wireless broadcasting APs (Access Points) are deployed all around and a user can easily connect to the public network anytime and anywhere. In this situation, an attacker can steal data from the connected user via wireless connection. Rogue AP (Rogue Access Point) is one of deodorization methods of attackers that solicitates users to connect to the rogue AP and intercept user data by setting up an AP with the same configuration of legitimate APs to make users not to distinguish it from the others installed in public places. In this way, if a user is connected to the Rogue AP, an attacker can cause critical problems by taking the user’s data and exploiting it for payment, authentication, and etc. Several researchers have studied ways to detect and prevent rogue APs based on dependent information including SSID (Service Set Identifier) and MAC (Media Access Control) addresses. This paper surveys the trials and methods to mitigate the rogue APs problems. In the survey, the components that can be used are listed and analyzed, enabling them to serve as a cornerstone for further work and present a vision for future research.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wilson, C.K., Shamier, C., McShane, I.: Public Wi-Fi: emergent urban infrastructure in the Asia Pacific and South Asia. Centre for Urban Research, RMIT University, Aug 2015
ManageEngine: Wireless network rogue access point detection & blocking
Kim, D.-P., Kang, C.-B., Kim, S.W.: Rogue AP protection system based on radius authentication serve. Kor. Inst. Inform. Sci. Eng. 31(1A), 316–318 (2004)
Kim, M., Jung, S.: Analysis on rogue AP DETECTION TECHNIQUES In WLAN service environments. Telecommun. Rev. 23(6), 750–757 (2013)
Vanjale, S., Mane, P. B.: A novel approach for elimination of rogue access point in wireless network. In: Annual IEEE India Conference (INDICON) (2014)
A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device. J. Kor. Inst. Commun. Inform. Sci. 38B(8), 632–640 (2013)
Park, S.: A rogue AP detection method based on DHCP snooping. J. Inter. Comput. Serv. (JICS) 17(3) (2016)
Park, B., Lee, T., Hong, M.: An unauthorized AP detection approach based on internal network information in wireless LAN. In: The 40th Korea Information Processing Society Fall Conference, pp. 761–763 (2013)
Bandal, G.B., Dhamdhere, V.S., Pardeshi, S.A.: Rogue access point detection system in wireless LAN. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 2(5) (2012)
Lim, K., Jung, S.: A scheme of mobile user-centric rogue AP detection in WLAN. Telecommun. Rev. 22(6), 822–834 (2012)
Ketkhaw, A., Thipchaksurat, S.: Rogue access point detection mechanism considering sequence number of Beacon frame for wireless local area networks. In: 14th International Conference on Electrical Enginerring/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pp. 509–512 (2017)
Kao, K.-F., Chen, W.-C., Chang, J.-C., Chu, H.T.: An accurate fake access point detection method based on deviation of Beacon time interval. In: Eighth International Conference on Software Security and Reliability—Companion (2014)
Ketkhaw, A., Thipchaksurat, S.: Hidden Rogue access point detection technique for wireless local area networks. In: 21st International Computer Science and Engineering Conference (ICSEC), pp. 163–167 (2017)
Acknowledgements
This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2019-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A4A1025632).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, M., Kwon, S., Elmazi, D., Lee, JH., Barolli, L., Yim, K. (2020). A Technical Survey on Methods for Detecting Rogue Access Points. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-22263-5_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22262-8
Online ISBN: 978-3-030-22263-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)