scholarly journals Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

Author(s):  
S. B. Vanjal ◽  
Amol K. Kadam ◽  
Pramod A. Jadhav

Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific wireless technology. In this paper we propose the integrated solution for detection and eliminate the rogue access points. Rogue detection algorithm is also proposed. This Methodology has the following properties: (1) it doesn’t require any specialized hardware; (2) the proposed algorithm detects and completely eliminates the RAPs from network; Our proposed solution is effective and low cost.

2021 ◽  
Vol 3 (11) ◽  
pp. 144-154
Author(s):  
Roman Korolkov

One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.


2020 ◽  
Vol 11 ◽  
pp. 100200
Author(s):  
Justice Owusu Agyemang ◽  
Jerry John Kponyo ◽  
Griffith Selorm Klogo ◽  
Joshua Ofori Boateng

Author(s):  
Diki Arisandi ◽  
Nazrul Muhaimin Ahmad ◽  
Subarmaniam Kannan

Most people around the world make use of public Wi-Fi hotspots, as their daily routine companion in communication. The access points (APs) of public Wi-Fi are easily deployed by anyone and everywhere, to provide hassle-free Internet connectivity. The availability of Wi-Fi increases the danger of adversaries, taking advantages of sniffing the sensitive data. One of the most serious security issues encountered by Wi-Fi users, is the presence of rogue access points (RAP). Several studies have been published regarding how to identify the RAP. Using systematic literature review, this research aims to explore the various methods on how to distinguish the AP, as a rogue or legitimate, based on the hardware and software approach model. In conclusion, all the classifications were summarized, and produced an alternative solution using beacon frame manipulation technique. Therefore, further research is needed to identify the RAP.


Respati ◽  
2021 ◽  
Vol 16 (2) ◽  
pp. 116
Author(s):  
Hidayatul Ichwan, Mardi Hardjianto

INTISASI Teknologi tanpa kabel yang lebih dikenal dengan Wi-Fi. Wi-Fi (Wirelles Fidelity) adalah koneksi tanpa kabel yang menghubungkan jaringan komputer, seperti ponsel yang menggunakan teknologi radio sehingga pengguna dapat melakukan transfer data dengan cepat dan aman. Kebutuhan akan Wi-Fi terlihat dengan jelas, baik di rumah, di kantor-kantor, di kampus, maupun pusat-pusat bisnis. Trafik pengguna Wi-Fi semakin tinggi, namun pemasangan Access Point belum tepat banyak access point yang terpasang yang pemasangannya tidak menentukan jarak antar access point. Menyebabkan penumpukan sinyal dengan access point lain dan area yang tidak tercover oleh access point atau area blankspot. Banyaknya pemasangan access point yang tidak tepat menjadi permasalahan yaitu koneksi Wi-Fi yang tidak stabil dan banyaknya tempat yang tidak terjangkau oleh sinyal Wi-Fi atau blankspot. Salah satu metode yang dipakai dalam penentuan pemasangan access point saat ini adalah menggunakan metode Simulated Annealing dan Trilateration. Penelitian ini akan membahas optimasi pemasangan access point dengan menggunakan metode trilateration  yang digunakan untuk mengukur jarak antar access point dan Simulated Aneling digunakan untuk mengukur kekuatan sinyal Wi-Fi. Dari hasil pemasangan Access point dengan menggunakan metode trialteration dan simulated annealing dapat mengurangi area blankspot dan mengurangi penumpukan sinyal dengan access point lain. Kata Kunci : access point, Simulated Annealing, Trilateration, Sinyal, Area.  ABSTRACT Wireless technology, better known as Wi-Fi. Wi-Fi (Wirelles Fidelity) is a wireless connection that connects computer networks, such as mobile phones that use radio technology so that users can transfer data quickly and safely. The need for Wi-Fi is clearly visible, both at home, in offices, on campus, and business centers. Wi-Fi user traffic is getting higher, but the installation of Access Points is not right yet, many installed access points do not determine the distance between access points. Causes signal buildup with other access points and areas not covered by the access point or blankspot area. The number of improper access point installations is a problem, namely unstable Wi-Fi connections and many places that are not covered by Wi-Fi or blankspot signals. One of the methods used in determining the installation of an access point is to use the Simulated Annealing and Trilateration method. This study will discuss the optimization of the installation of access points using the trilateration method used to measure the distance between access points and Simulated Aneling is used to measure the strength of Wi-Fi signals. From the results of installing Access Points using the method of trialteration and simulated annealing can reduce the blankspot area and reduce the buildup of signals with other access points. Keywords: access point, Trilateration, Anneling Simulation, Signal, Area.


2018 ◽  
Author(s):  
Luiz Claudio Schara Magalhães ◽  
Diogo Menezes Ferrazani Mattos

Managing wireless networks is challenging due to the requirement of ensuring good performance while coexisting with other networks. This paper analyses a production wireless network that is also used for research. The wireless network at Universidade Federal Fluminense uses home grown technology which was funded by RNP in the SCIFI work group, which is composed of a software controller and low cost access points compatible with OpenWRT. The analysis of the wireless network is performed modeling the network as a directed graph, in which nodes are the access points and edges represent vicinity. Algorithms for choosing the wireless channel in order to maximize performance by minimizing interference both by access points which are controlled or not by the system. The characteristics of associations of user devices to the wireless network are shown. The results of the analysis show that, after the installation of new channel, up to 75% of unmanaged networks in the vicinity of an access point switch their channel to adapt to the new wireless configuration.


Author(s):  
Menal Dahiya ◽  
Sumeet Gill

The serious issue in the field of wireless communication is the security and how an organization implements the steps against security breach. The major attack on any organization is Man in the Middle attack which is difficult to manage. This attack leads to number of unauthorized access points, called rogue access points which are not detected easily. In this paper, we proposed a Hopfield Neural Network approach for an automatic detection of these rogue access points in wireless networking. Here, we store the passwords of the authentic devices in the weight matrix format and match the patterns at the time of login. Simulation experiment shows that this method is more secure than the traditional one in WLAN.


2021 ◽  
Vol 11 (1) ◽  
pp. 13-20
Author(s):  
Roman Y. Korolkov ◽  
Serhii V. Kutsak

The “Evil twin” rogue access point is one of the most serious security threats to wireless LANs. To solve this problem, a practical approach has been proposed for detecting rogue access points using the received signal strength indicator (RSSI). First, a distributed architecture is presented, which consists of three network analyzers. Then, a cluster analysis of the RSSI vectors is performed to determine the attack. The coordinates of the centroids of clusters obtained were converted into the distance by using an empirical model of signal propagation under indoor conditions. The obtained distances are used to determine the localization of a rogue access point (RAP) using the trilateration method. Finally, we are conducting experiments to evaluate the performance of practical RAP detection. The results show that the proposed approach to detecting rogue access points can significantly reduce the frequency of false alarms, while providing an average localization error of 1.5m, which is quite acceptable for RAP localization in real indoor conditions.


Author(s):  
Tianpei Tang ◽  
Senlai Zhu ◽  
Yuntao Guo ◽  
Xizhao Zhou ◽  
Yang Cao

Evaluating the safety risk of rural roadsides is critical for achieving reasonable allocation of a limited budget and avoiding excessive installation of safety facilities. To assess the safety risk of rural roadsides when the crash data are unavailable or missing, this study proposed a Bayesian Network (BN) method that uses the experts’ judgments on the conditional probability of different safety risk factors to evaluate the safety risk of rural roadsides. Eight factors were considered, including seven factors identified in the literature and a new factor named access point density. To validate the effectiveness of the proposed method, a case study was conducted using 19.42 km long road networks in the rural area of Nantong, China. By comparing the results of the proposed method and run-off-road (ROR) crash data from 2015–2016 in the study area, the road segments with higher safety risk levels identified by the proposed method were found to be statistically significantly correlated with higher crash severity based on the crash data. In addition, by comparing the respective results evaluated by eight factors and seven factors (a new factor removed), we also found that access point density significantly contributed to the safety risk of rural roadsides. These results show that the proposed method can be considered as a low-cost solution to evaluating the safety risk of rural roadsides with relatively high accuracy, especially for areas with large rural road networks and incomplete ROR crash data due to budget limitation, human errors, negligence, or inconsistent crash recordings.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1179
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Juan Arturo Nolazco-Flores ◽  
Alma Rodríguez ◽  
Julio C. Rosas-Caro ◽  
...  

Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protocol and the nodes increase power consumption, which is detrimental to the network’s performance. In this work, a simple jamming detection algorithm is proposed based on an exhaustive study of performance metrics related to the routing protocol and a significant impact on node energy. With this approach, the proposed algorithm detects areas of affected nodes with minimal energy expenditure. Detection is evaluated for four known cluster-based protocols: PEGASIS, TEEN, LEACH, and HPAR. The experiments analyze the protocols’ performance through the metrics chosen for a jamming detection algorithm. Finally, we conducted real experimentation with the best performing wireless protocols currently used, such as Zigbee and LoRa.


Sign in / Sign up

Export Citation Format

Share Document