Skip to main content

Rogue Access Point Detection in Vehicular Environments

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

The threat of rogue access points (APs) has attracted significant attentions from both industrial and academic researchers. This paper considers a category of rogue APs that are set up in moving vehicles to lure users. Usually, rogue access points are on the moving vehicles that can keep close distance to the users at all time, thus the adversary has more time to expose private information of users. This paper proposes a practical detecting rogue APs algorithm based on received signal strength (RSS), which calculates the distance between the user and the APs to defend against the rogue APs. The paper also develops a relative position algorithm to find the position of AP. If the position of AP is on the road rather than on the road side, the algorithm suspects that the AP is rogue AP. In this paper, we also have implemented the detection algorithm on real vehicular environments and also have evaluated the performance of the proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, Y., Zhu, Y.: CCR: Capacity-constrained replication for data delivery in vehicular networks. In: INFOCOM, pp. 2580–2588 (2013)

    Google Scholar 

  2. Guan, X., Huang, Y., Cai, Z., Ohtsuki, T.: Intersection-based forwarding protocol for vehicular ad hoc networks. Telecommunication Systems. 10.1007/s11235-015-9983-y (2015)

    Google Scholar 

  3. Cheng, S., Cai, Z., Li, J.: Curve query processing in wireless sensor networks. IEEE Trans. Veh. Technol., 1–12 (2014)

    Google Scholar 

  4. Farnoud, F., Valaee, S.: Reliable broadcast of safety messages in vehicular ad hoc networks. In: INFOCOM, pp. 226–234 (2009)

    Google Scholar 

  5. Zhu, H., et al.: ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks. In: INFOCOM, pp. 2832–2840 (2013)

    Google Scholar 

  6. Watkins, L., et al.: A passive approach to rogue access point detection. In: GLOBECOM, pp. 355–360 (2007)

    Google Scholar 

  7. Han, H., Sheng, B.: A measurement based rogue ap detection scheme. In: INFOCOM, pp. 1593–1601 (2009)

    Google Scholar 

  8. Yin, H., Chen, G.: Detecting protected layer-3 rogue aps. In: BROADNEtS, pp. 449–458 (2007)

    Google Scholar 

  9. Shetty, S., Song, M.: Rogue access point detection by analyzing network traffic characteristics. In: MILCOM, pp. 1–7 (2007)

    Google Scholar 

  10. Cheng, L., et al.: Doppler spread and coherence time of rural and highway vehicle-to-vehicle channels at 5.9 GHz. In: GLOBECOM, pp. 1–6 (2008)

    Google Scholar 

  11. Camp, J., et al.: Modulation rate adaptation in urban and vehicular environments: cross-layer implementation and experimental evaluation. IEEE/ACM Trans. Netw. 18(6), 1949–1962 (2010)

    Article  Google Scholar 

  12. Liu, C., Yu, J.: Rogue access point based Dos attacks against 802.11 WLANs. In: AICT, pp. 271–276 (2008)

    Google Scholar 

  13. Chandra, R., et al.: A location-based management system for enterprise wireless lans. In: NSDI (2007)

    Google Scholar 

  14. Air defence. www.airdefence.net

  15. Air magnet. www.airmagnet.com

  16. Bahl, P., et al.: Enhancing the security of corporate Wi-Fi networks using DAIR. In: MobiSys (2006)

    Google Scholar 

  17. Gao, K., et al.: A passive approach to wireless device fingerprinting. In: DSN, pp. 383–392 (2010)

    Google Scholar 

  18. Han, H., et al.: Defending against vehicular rogue APs. In: INFOCOM, pp. 1665–1673 (2011)

    Google Scholar 

  19. Brik, V., et al.: Wireless device identification with radiometric signatures. In: MOBICOM (2008)

    Google Scholar 

  20. Sheng, Y., Tan, K.: Detecting 802.11 MAC layer spoofing using received signal strength. In: INFOCOM, pp. 383–392 (2008)

    Google Scholar 

  21. Jana, S., Kasera, S.: On fast and accurate detection of unauthorized wireless access points using clock skews. In: TMC, pp. 449–462 (2010)

    Google Scholar 

  22. Ling, Z., et al.: Novel packet size-based covert channel attacks against anonymizer. IEEE Trans. Comput. 62, 2411–2426 (2013)

    Article  MathSciNet  Google Scholar 

  23. Long, T., et al.: Optimization of RSSI algorithm in wireless sensor network. In: Computer System Application (2013)

    Google Scholar 

  24. TelosB Ddatasheet. http://www.willow.co.uk/html/telosb_mote_platform.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Longjiang Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Qu, H., Guo, L., Zhang, W., Li, J., Ren, M. (2015). Rogue Access Point Detection in Vehicular Environments. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics