Bodhe et al. - Google Patents
The RAP: Wireless SecurityBodhe et al.
View PDF- Document ID
- 3947404995673487029
- Author
- Bodhe A
- Thakur S
- Thakur P
External Links
Snippet
In proposed paper we introduced more powerful techniques are to detect rouge APs and to improve network resilience. Here an efficient rogue AP protection system termed as RAP for detection of any fraud in wireless communication. This system designed has nice properties …
- 238000001514 detection method 0 abstract description 28
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ma et al. | A hybrid rogue access point protection framework for commodity Wi-Fi networks | |
| US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
| US7970894B1 (en) | Method and system for monitoring of wireless devices in local area computer networks | |
| Lim et al. | Wireless intrusion detection and response | |
| US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
| Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
| US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
| EP3422665B1 (en) | Sensor-based wireless network vulnerability detection | |
| US7710933B1 (en) | Method and system for classification of wireless devices in local area computer networks | |
| US10498758B1 (en) | Network sensor and method thereof for wireless network vulnerability detection | |
| Jang et al. | Catch me if you can: Rogue access point detection using intentional channel interference | |
| Sobh | Wi-Fi networks security and accessing control | |
| Kitisriworapan et al. | Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis | |
| Ma et al. | RAP: Protecting commodity wi-fi networks from rogue access points | |
| Metwally et al. | Detecting semantic social engineering attack in the context of information security | |
| Alghareeb et al. | Cyber Security Threats in Wireless LAN: A Literature Review | |
| Al-Gharabally et al. | Wireless honeypots: survey and assessment | |
| Bodhe et al. | The RAP: Wireless Security | |
| Thakur et al. | RAPD algorithm: detection of rogue access point in wireless network | |
| Hasan et al. | Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures | |
| Budhrani et al. | Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools | |
| Thakur et al. | Review on RAP: Protecting Wi-Fi Networks from Rogue Access Points | |
| Neumerkel et al. | A sophisticated solution for revealing attacks on wireless LAN | |
| Ma et al. | Passive listening and intrusion management in commodity wi-fi networks | |
| Yevdokymenko et al. | Overview of the Course in “Wireless and Mobile Security” |