Development of Device Identity using WIFI Layer 2 Management Frames for Combating Rogue APs


Autoria(s): Milliken, Jonny; Selis, Valerio; Yap, Kian Meng; Marshall, Alan
Data(s)

2013

Resumo

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge

Formato

application/pdf

Identificador

http://pure.qub.ac.uk/portal/en/publications/development-of-device-identity-using-wifi-layer-2-management-frames-for-combating-rogue-aps(47d1aed1-bc98-4970-9132-78697326b5d9).html

http://pure.qub.ac.uk/ws/files/4111570/SECRYPT_Development_of_Device_Identity_using_WIFI_Layer_2_Management_Frames_for_Combating_Rogue_APs_CR.pdf

Idioma(s)

eng

Direitos

info:eu-repo/semantics/openAccess

Fonte

Milliken , J , Selis , V , Yap , K M & Marshall , A 2013 , ' Development of Device Identity using WIFI Layer 2 Management Frames for Combating Rogue APs ' Paper presented at International Conference on Security and Cryptography (SECRYPT) , Reykjavik , Iceland , 29/07/2013 - 31/07/2013 , .

Palavras-Chave #WiFi #WLAN #Rogue AP #Managment Frames #MAC
Tipo

conferenceObject