Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions

被引:0
|
作者
Bandar Alotaibi
Khaled Elleithy
机构
[1] University of Bridgeport,Computer Science and Engineering Department
来源
Wireless Personal Communications | 2016年 / 90卷
关键词
WLAN; Rogue Access Point; Evil-twin; Unauthorized AP; DoS attacks; Four-way handshake;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless Local Area Networks (WLANs) are increasingly integrated into our daily lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are responsible for coordinating wireless users and connecting them to the wired side of the network and, eventually, to the Internet. APs are deployed everywhere, from airports and shopping malls to coffee shops and hospitals, to provide Internet connectivity. One of the most serious security problems encountered by WLAN users is the existence of Rogue Access Points (RAPs). This article classifies existing solutions, identifies vulnerabilities, and suggests future directions for research into these RAPs. The ultimate objective is to classify existing detection techniques and find new RAP types that have not been classified by the research community. The literature typically categorizes Evil-twin, Unauthorized, Compromised, and Improperly Configured RAPs. Two other types have largely been abandoned by researchers, but can be classified as Denial of Service RAP attacks. These are deauthentication/disassociation attacks targeting wireless users, and the forging of the first message in a four-way handshake.
引用
收藏
页码:1261 / 1290
页数:29
相关论文
共 50 条
  • [1] Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions
    Alotaibi, Bandar
    Elleithy, Khaled
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) : 1261 - 1290
  • [2] Rogue-Access-Point Detection Challenges, Solutions, and Future Directions
    Beyah, Raheem
    Venkataraman, Aravind
    IEEE SECURITY & PRIVACY, 2011, 9 (05) : 56 - 61
  • [3] Rogue Access Point Detection and Localization
    Le, Tung M.
    Liu, Ren Ping
    Hedley, Mark
    2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 2489 - 2493
  • [4] Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions
    Do, Nguyet Quang
    Selamat, Ali
    Krejcar, Ondrej
    Herrera-Viedma, Enrique
    Fujita, Hamido
    IEEE ACCESS, 2022, 10 : 36429 - 36463
  • [5] Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
    Gorment, Nor Zakiah
    Selamat, Ali
    Cheng, Lim Kok
    Krejcar, Ondrej
    IEEE ACCESS, 2023, 11 : 141045 - 141089
  • [6] A passive approach to rogue access point detection
    Watkins, Lanier
    Beyah, Raheem
    Corbett, Cherita
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 355 - +
  • [7] Rogue Access Point Detection Methods: A Review
    Anmulwar, Sweta
    Srivastava, Shalvi
    Mahajan, Shrinivas P.
    Gupta, Anil Kumar
    Kumar, Vinodh
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [8] Rogue Access Point Detection in Vehicular Environments
    Qu, Hao
    Guo, Longjiang
    Zhang, Weiping
    Li, Jinbao
    Ren, Meirui
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 446 - 456
  • [9] Video Steganography Techniques: Taxonomy, Challenges, and Future Directions
    Mstafa, Ramadhan J.
    Elleithy, Khaled M.
    Abdelfattah, Eman
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [10] A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
    Nelaturu, Keerthi
    Du, Han
    Le, Duc-Phong
    CRYPTOGRAPHY, 2022, 6 (02)