A Novel Approach for Rogue Access Point Detection on the Client-Side

There is a big risk for public Wi-Fi users being tricked into connecting to rogue access points. Rogue access point is one of the most serious threats in WLAN, since it exposes a large number of users to MITM and evil twin attack. In this paper we propose a practical method that warns users to avoid connecting to the rogue access points. Proposed method compares the gateways and the routes that a packet travels to determine whether an access point is legitimate or not. This method can easily detect Man-In-The-Middle and evil twin attack without any assistance from the WLAN operator.

[1]  Alec Wolman,et al.  Enhancing the security of corporate Wi-Fi networks using DAIR , 2006, MobiSys '06.

[2]  D. Woolley The White Paper. , 1972, British medical journal.

[3]  Tim Kindberg,et al.  Authenticating Public Wireless Networks with Physical Evidence , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[4]  Bo Sheng,et al.  A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.

[5]  Chao Yang,et al.  Who is peeping at your passwords at Starbucks? — To catch an evil twin access point , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[6]  Raheem A. Beyah,et al.  Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[7]  Raheem A. Beyah,et al.  A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[8]  Guangzhi Qu,et al.  RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.

[9]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.

[10]  I-En Liao,et al.  Detecting rogue access points using client-side bottleneck bandwidth analysis , 2009, Comput. Secur..

[11]  Volker Roth,et al.  Simple and effective defense against evil twin access points , 2008, WiSec '08.

[12]  Min Song,et al.  A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[13]  Donald F. Towsley,et al.  Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.