Skip to main content

Analysis of Wardriving Activity and WiFi Access Points

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 366))

Abstract

This paper proposes a system composed of hardware and software components that facilitates the activity of wardriving and assists in collecting statistical data by GPS of WiFi networks and their security status in particular area. The application has the potential of being used as a tool to study WiFi security trends or for misuse and WiFi exploitation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, M., Fielding, J.J., Kotz, D.: Risks of Using AP Locations Discovered Through War Driving, Department of Computer Science (DartmouthCollege) (2006)

    Google Scholar 

  2. Lawrence, E., Lawrence, J.: Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004, April 5-7, vol. 2, pp. 268–273 (2004), doi:10.1109/ITCC.2004.1286645

    Google Scholar 

  3. Jones, K., Liu, L.: What Where Wi: An Analysis of Millions of Wi-Fi Access Points. In: IEEE International Conference on Portable Information Devices, PORTABLE 2007, May 25-29, pp. 1–4 (2007), doi:10.1109/PORTABLE.2007.45

    Google Scholar 

  4. Hurley, C.: WarDriving Drive, Detect, Defend: A Guide to Wireless Security. Syngress Publishing, Massachusetts (2004)

    Google Scholar 

  5. McClure, S.: Hacking Exposed 6: Network Security Secrets & Solutions. McGraw Hill, New York (2009)

    Google Scholar 

  6. Yoshida, H., Ito, S., Kawaguchi, N.: Evaluation of pre-acquisition methods for position estimation system using wireless LAN. In: Proceedings of the Third International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2006, London, UK, pp. 148–155 (October 2006)

    Google Scholar 

  7. Zhang, J., et al.: Advancing wireless link signatures for location distinction. In: MobiCom. ACM (2008)

    Google Scholar 

  8. Kim, M., Fielding, J.J., Kotz, D.: Risks of using AP locations discovered through war driving. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 67–82. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Subramanian, A.P., et al.: Drive-By Localization of Roadside WiFi Networks. In: IEEE The 27th Conference on Computer Communications, INFOCOM 2008, pp. 718–725 (2008), doi:10.1109/INFOCOM.2008.122

    Google Scholar 

  10. Peng, H.: WIFI network information security analysis research. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet, April 21-23, pp. 2243–2245 (2012), doi:10.1109/CECNet.2012.6201786

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Eldaw, E., Zeki, A.M., Senan, S. (2013). Analysis of Wardriving Activity and WiFi Access Points. In: Shaikh, F.K., Chowdhry, B.S., Ammari, H.M., Uqaili, M.A., Shah, A. (eds) Wireless Sensor Networks for Developing Countries. WSN4DC 2013. Communications in Computer and Information Science, vol 366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41054-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41054-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41053-6

  • Online ISBN: 978-3-642-41054-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics