CFP last date
20 December 2024
Reseach Article

Rogue AP Detection: The Tale of a Datagram and its Algorithms

by Piyush Choudhary, Vineet Trivedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 1
Year of Publication: 2015
Authors: Piyush Choudhary, Vineet Trivedi
10.5120/ijca2015906315

Piyush Choudhary, Vineet Trivedi . Rogue AP Detection: The Tale of a Datagram and its Algorithms. International Journal of Computer Applications. 127, 1 ( October 2015), 32-35. DOI=10.5120/ijca2015906315

@article{ 10.5120/ijca2015906315,
author = { Piyush Choudhary, Vineet Trivedi },
title = { Rogue AP Detection: The Tale of a Datagram and its Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 1 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number1/22696-2015906315/ },
doi = { 10.5120/ijca2015906315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:46.172378+05:30
%A Piyush Choudhary
%A Vineet Trivedi
%T Rogue AP Detection: The Tale of a Datagram and its Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 1
%P 32-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless LAN, in the current state of the world, has become ubiquitous. Therefore it is imperative to safeguard this technology, which otherwise could prove disastrous. Compromised WLANs, have the potential to leave the user susceptible to a plethora of unfavorable situations. In the following paper it is attempted to make wireless networks more easily secure by addressing one of the more commonly exploited technique of Rogue Access Points. This problem is tackled by articulating a method by which clients can recognize Access points to which they have previously connected. After a standard authentication procedure a packet exchange mechanism is used buttressed by a host of algorithms, selected randomly from an algorithm pool, which are run on selected packages on the client as well as the Access Point in order to completely obviate the possibility of a client connecting to a Rogue Access Point.

References
  1. Bowman, M., Debray, S. K., and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender.
Index Terms

Computer Science
Information Sciences

Keywords

Access Points Rogue Access Points Wireless sniffing MITM Traffic Monitoring.