Research Article

Rogue AP Detection: The Tale of a Datagram and its Algorithms

by  Piyush Choudhary, Vineet Trivedi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Issue 1
Published: October 2015
Authors: Piyush Choudhary, Vineet Trivedi
10.5120/ijca2015906315
PDF

Piyush Choudhary, Vineet Trivedi . Rogue AP Detection: The Tale of a Datagram and its Algorithms. International Journal of Computer Applications. 127, 1 (October 2015), 32-35. DOI=10.5120/ijca2015906315

                        @article{ 10.5120/ijca2015906315,
                        author  = { Piyush Choudhary,Vineet Trivedi },
                        title   = { Rogue AP Detection: The Tale of a Datagram and its Algorithms },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 127 },
                        number  = { 1 },
                        pages   = { 32-35 },
                        doi     = { 10.5120/ijca2015906315 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Piyush Choudhary
                        %A Vineet Trivedi
                        %T Rogue AP Detection: The Tale of a Datagram and its Algorithms%T 
                        %J International Journal of Computer Applications
                        %V 127
                        %N 1
                        %P 32-35
                        %R 10.5120/ijca2015906315
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless LAN, in the current state of the world, has become ubiquitous. Therefore it is imperative to safeguard this technology, which otherwise could prove disastrous. Compromised WLANs, have the potential to leave the user susceptible to a plethora of unfavorable situations. In the following paper it is attempted to make wireless networks more easily secure by addressing one of the more commonly exploited technique of Rogue Access Points. This problem is tackled by articulating a method by which clients can recognize Access points to which they have previously connected. After a standard authentication procedure a packet exchange mechanism is used buttressed by a host of algorithms, selected randomly from an algorithm pool, which are run on selected packages on the client as well as the Access Point in order to completely obviate the possibility of a client connecting to a Rogue Access Point.

References
  • Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  • Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  • Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  • Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  • Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  • Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  • Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  • Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  • Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Access Points Rogue Access Points Wireless sniffing MITM Traffic Monitoring.

Powered by PhDFocusTM