Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength

With the widespread use of Wireless Local Area Network(WLAN)s Rogue Access Point(AP)s have become a severe security threat to the WLAN user. In a recent survey, Gartner reported that nearly 20% organizations have rogue access points inside their premises. WLANs have evolved with the rapid development of wireless technologies. Nowadays WLAN is present in almost everywhere from a school to a Multinational Company, a coffee shop to public transport. Their presence has become indispensable in any organization, as they are cost effective and easily deployable. Predicting rogue access points with proper accuracy and using low cost is a very challenging task. In this paper, we propose an external rogue access point prediction mechanism which uses radio frequency(RF) signal strength to predict a rogue access point. The prediction of rogue access points happens in two phases: Distance Calculation and Access Point Prediction. The first phase uses FSPL transmission model to calculate the distances of various APs from the user device by collecting strength of radio frequency signal from each AP. The second phase predicts whether an external AP is rogue or not based on the calculated distance and by comparing it with a threshold distance. We have tested our mechanism by implementing it in an Android based smartphone and it was successfully able to predict rogue APs with acceptable accuracies. The threshold values were decided based on extensive experiments conducted in IIT Guwahati campus.

[1]  Aboelmagd Noureldin,et al.  Vehicle navigator using a mixture particle filter for inertial sensors/odometer/map data/GPS integration , 2012, IEEE Transactions on Consumer Electronics.

[2]  Bhale Pradeepkumar Gajendra,et al.  Achieving cloud security using third party auditor, MD5 and identity-based encryption , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[3]  Donald F. Towsley,et al.  Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.

[4]  Chen Wang,et al.  Accurate rogue access point localization leveraging fine-grained channel information , 2014, 2014 IEEE Conference on Communications and Network Security.

[5]  Jie Gao,et al.  Drive-By Localization of Roadside WiFi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[6]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[7]  John Krumm,et al.  Accuracy characterization for metropolitan-scale Wi-Fi localization , 2005, MobiSys '05.

[8]  K. Gopalakrishnan,et al.  Cyber Security for Airports , 2013 .

[9]  Mani B. Srivastava,et al.  Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.

[10]  Srihari Nelakuditi,et al.  SpinLoc: spin once to know your location , 2012, HotMobile '12.

[11]  Martyn Mallick Mobile and Wireless Design Essentials , 2003 .

[12]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[13]  Deepak Kumar Gupta,et al.  DoS attack detection technique using back propagation neural network , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[14]  Guangzhi Qu,et al.  RAPiD: An indirect rogue access points detection system , 2010, International Performance Computing and Communications Conference.

[15]  W. Marsden I and J , 2012 .

[16]  Bo Sheng,et al.  A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.

[17]  Alan V. Oppenheim,et al.  Digital Signal Processing , 1978, IEEE Transactions on Systems, Man, and Cybernetics.