Skip to main content

A Technical Survey on Methods for Detecting Rogue Access Points

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 994))

Abstract

These days, wireless networks have become an indispensable environment in our life. Wireless broadcasting APs (Access Points) are deployed all around and a user can easily connect to the public network anytime and anywhere. In this situation, an attacker can steal data from the connected user via wireless connection. Rogue AP (Rogue Access Point) is one of deodorization methods of attackers that solicitates users to connect to the rogue AP and intercept user data by setting up an AP with the same configuration of legitimate APs to make users not to distinguish it from the others installed in public places. In this way, if a user is connected to the Rogue AP, an attacker can cause critical problems by taking the user’s data and exploiting it for payment, authentication, and etc. Several researchers have studied ways to detect and prevent rogue APs based on dependent information including SSID (Service Set Identifier) and MAC (Media Access Control) addresses. This paper surveys the trials and methods to mitigate the rogue APs problems. In the survey, the components that can be used are listed and analyzed, enabling them to serve as a cornerstone for further work and present a vision for future research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wilson, C.K., Shamier, C., McShane, I.: Public Wi-Fi: emergent urban infrastructure in the Asia Pacific and South Asia. Centre for Urban Research, RMIT University, Aug 2015

    Google Scholar 

  2. ManageEngine: Wireless network rogue access point detection & blocking

    Google Scholar 

  3. Kim, D.-P., Kang, C.-B., Kim, S.W.: Rogue AP protection system based on radius authentication serve. Kor. Inst. Inform. Sci. Eng. 31(1A), 316–318 (2004)

    Google Scholar 

  4. Kim, M., Jung, S.: Analysis on rogue AP DETECTION TECHNIQUES In WLAN service environments. Telecommun. Rev. 23(6), 750–757 (2013)

    Google Scholar 

  5. Vanjale, S., Mane, P. B.: A novel approach for elimination of rogue access point in wireless network. In: Annual IEEE India Conference (INDICON) (2014)

    Google Scholar 

  6. A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device. J. Kor. Inst. Commun. Inform. Sci. 38B(8), 632–640 (2013)

    Google Scholar 

  7. Park, S.: A rogue AP detection method based on DHCP snooping. J. Inter. Comput. Serv. (JICS) 17(3) (2016)

    Google Scholar 

  8. Park, B., Lee, T., Hong, M.: An unauthorized AP detection approach based on internal network information in wireless LAN. In: The 40th Korea Information Processing Society Fall Conference, pp. 761–763 (2013)

    Google Scholar 

  9. Bandal, G.B., Dhamdhere, V.S., Pardeshi, S.A.: Rogue access point detection system in wireless LAN. Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 2(5) (2012)

    Google Scholar 

  10. Lim, K., Jung, S.: A scheme of mobile user-centric rogue AP detection in WLAN. Telecommun. Rev. 22(6), 822–834 (2012)

    Google Scholar 

  11. Ketkhaw, A., Thipchaksurat, S.: Rogue access point detection mechanism considering sequence number of Beacon frame for wireless local area networks. In: 14th International Conference on Electrical Enginerring/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pp. 509–512 (2017)

    Google Scholar 

  12. Kao, K.-F., Chen, W.-C., Chang, J.-C., Chu, H.T.: An accurate fake access point detection method based on deviation of Beacon time interval. In: Eighth International Conference on Software Security and Reliability—Companion (2014)

    Google Scholar 

  13. Ketkhaw, A., Thipchaksurat, S.: Hidden Rogue access point detection technique for wireless local area networks. In: 21st International Computer Science and Engineering Conference (ICSEC), pp. 163–167 (2017)

    Google Scholar 

Download references

Acknowledgements

This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2019-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A4A1025632).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kangbin Yim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, M., Kwon, S., Elmazi, D., Lee, JH., Barolli, L., Yim, K. (2020). A Technical Survey on Methods for Detecting Rogue Access Points. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_21

Download citation

Publish with us

Policies and ethics