Bodhe et al. - Google Patents
The RAP: Wireless SecurityBodhe et al.
View PDF- Document ID
- 3947404995673487029
- Author
- Bodhe A
- Thakur S
- Thakur P
External Links
Snippet
In proposed paper we introduced more powerful techniques are to detect rouge APs and to improve network resilience. Here an efficient rogue AP protection system termed as RAP for detection of any fraud in wireless communication. This system designed has nice properties …
- 238000001514 detection method 0 abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ma et al. | A hybrid rogue access point protection framework for commodity Wi-Fi networks | |
| US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
| US7970894B1 (en) | Method and system for monitoring of wireless devices in local area computer networks | |
| US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
| Lim et al. | Wireless intrusion detection and response | |
| US7710933B1 (en) | Method and system for classification of wireless devices in local area computer networks | |
| Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
| US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
| EP3422665B1 (en) | Sensor-based wireless network vulnerability detection | |
| US10498758B1 (en) | Network sensor and method thereof for wireless network vulnerability detection | |
| Waliullah et al. | An experimental study analysis of security attacks at IEEE 802.11 wireless local area network | |
| Jang et al. | Catch me if you can: Rogue access point detection using intentional channel interference | |
| Sobh | Wi-Fi networks security and accessing control | |
| Kitisriworapan et al. | Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis | |
| Ma et al. | RAP: Protecting commodity wi-fi networks from rogue access points | |
| Metwally et al. | Detecting semantic social engineering attack in the context of information security | |
| Al-Gharabally et al. | Wireless honeypots: survey and assessment | |
| Budhrani et al. | Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools | |
| Bodhe et al. | The RAP: Wireless Security | |
| Thakur et al. | RAPD algorithm: detection of rogue access point in wireless network | |
| Thakur et al. | Review on RAP: Protecting Wi-Fi Networks from Rogue Access Points | |
| Neumerkel et al. | A sophisticated solution for revealing attacks on wireless LAN | |
| Hasan et al. | Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures | |
| Yevdokymenko et al. | Overview of the Course in “Wireless and Mobile Security” | |
| Ma et al. | Passive listening and intrusion management in commodity wi-fi networks |