[go: up one dir, main page]

Bodhe et al. - Google Patents

The RAP: Wireless Security

Bodhe et al.

View PDF
Document ID
3947404995673487029
Author
Bodhe A
Thakur S
Thakur P

External Links

Snippet

In proposed paper we introduced more powerful techniques are to detect rouge APs and to improve network resilience. Here an efficient rogue AP protection system termed as RAP for detection of any fraud in wireless communication. This system designed has nice properties …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Similar Documents

Publication Publication Date Title
Ma et al. A hybrid rogue access point protection framework for commodity Wi-Fi networks
US7577424B2 (en) Systems and methods for wireless vulnerability analysis
US7970894B1 (en) Method and system for monitoring of wireless devices in local area computer networks
US8281392B2 (en) Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
Lim et al. Wireless intrusion detection and response
US7710933B1 (en) Method and system for classification of wireless devices in local area computer networks
Alotaibi et al. Rogue access point detection: Taxonomy, challenges, and future directions
US20150040194A1 (en) Monitoring of smart mobile devices in the wireless access networks
EP3422665B1 (en) Sensor-based wireless network vulnerability detection
US10498758B1 (en) Network sensor and method thereof for wireless network vulnerability detection
Waliullah et al. An experimental study analysis of security attacks at IEEE 802.11 wireless local area network
Jang et al. Catch me if you can: Rogue access point detection using intentional channel interference
Sobh Wi-Fi networks security and accessing control
Kitisriworapan et al. Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis
Ma et al. RAP: Protecting commodity wi-fi networks from rogue access points
Metwally et al. Detecting semantic social engineering attack in the context of information security
Al-Gharabally et al. Wireless honeypots: survey and assessment
Budhrani et al. Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools
Bodhe et al. The RAP: Wireless Security
Thakur et al. RAPD algorithm: detection of rogue access point in wireless network
Thakur et al. Review on RAP: Protecting Wi-Fi Networks from Rogue Access Points
Neumerkel et al. A sophisticated solution for revealing attacks on wireless LAN
Hasan et al. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures
Yevdokymenko et al. Overview of the Course in “Wireless and Mobile Security”
Ma et al. Passive listening and intrusion management in commodity wi-fi networks