Abstract
This paper proposes a system composed of hardware and software components that facilitates the activity of wardriving and assists in collecting statistical data by GPS of WiFi networks and their security status in particular area. The application has the potential of being used as a tool to study WiFi security trends or for misuse and WiFi exploitation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Kim, M., Fielding, J.J., Kotz, D.: Risks of Using AP Locations Discovered Through War Driving, Department of Computer Science (DartmouthCollege) (2006)
Lawrence, E., Lawrence, J.: Threats to the mobile enterprise: jurisprudence analysis of wardriving and warchalking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004, April 5-7, vol. 2, pp. 268–273 (2004), doi:10.1109/ITCC.2004.1286645
Jones, K., Liu, L.: What Where Wi: An Analysis of Millions of Wi-Fi Access Points. In: IEEE International Conference on Portable Information Devices, PORTABLE 2007, May 25-29, pp. 1–4 (2007), doi:10.1109/PORTABLE.2007.45
Hurley, C.: WarDriving Drive, Detect, Defend: A Guide to Wireless Security. Syngress Publishing, Massachusetts (2004)
McClure, S.: Hacking Exposed 6: Network Security Secrets & Solutions. McGraw Hill, New York (2009)
Yoshida, H., Ito, S., Kawaguchi, N.: Evaluation of pre-acquisition methods for position estimation system using wireless LAN. In: Proceedings of the Third International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2006, London, UK, pp. 148–155 (October 2006)
Zhang, J., et al.: Advancing wireless link signatures for location distinction. In: MobiCom. ACM (2008)
Kim, M., Fielding, J.J., Kotz, D.: Risks of using AP locations discovered through war driving. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 67–82. Springer, Heidelberg (2006)
Subramanian, A.P., et al.: Drive-By Localization of Roadside WiFi Networks. In: IEEE The 27th Conference on Computer Communications, INFOCOM 2008, pp. 718–725 (2008), doi:10.1109/INFOCOM.2008.122
Peng, H.: WIFI network information security analysis research. In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet, April 21-23, pp. 2243–2245 (2012), doi:10.1109/CECNet.2012.6201786
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Eldaw, E., Zeki, A.M., Senan, S. (2013). Analysis of Wardriving Activity and WiFi Access Points. In: Shaikh, F.K., Chowdhry, B.S., Ammari, H.M., Uqaili, M.A., Shah, A. (eds) Wireless Sensor Networks for Developing Countries. WSN4DC 2013. Communications in Computer and Information Science, vol 366. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41054-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-41054-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41053-6
Online ISBN: 978-3-642-41054-3
eBook Packages: Computer ScienceComputer Science (R0)