On Wireless Rogue Access Detection Using Clock Skew Method
Abstract
Rogue Access Point (RAP) is an access point that has
been installed on a secure network without explicit authorization
from a system administrator. The major security thread for the
Wireless Networks is a presence of Rough access points. If this kind
of network threats are not detected and mitigated on time, those will
lead to the serious network damage and data loss. Finding and
avoiding rogue wireless access points is a main issued for every
organization. We use clock skew as a parameter of a wireless access
point (AP) to detect unauthorized AP’s. Using clock skews method to
detect Rogue access point in wireless LAN network overcomes the
limitations of existing solutions. We calculate the clock skew of an
AP from the IEEE 802.11 Time Synchronization Function (TSF) time
stamps sent out in the beacon/probe response frames. We use leastsquare
fit method for this purpose. Our results indicate that the use of
clock skews appears to be an effective and robust method for
detecting fake AP’s in wireless local area networks.
Keywords
Full Text:
PDFReferences
“How thing works: WLAN Technologies and security Mechanisms”
http://www.sans.org/reading_room/whitepapers/wireless/thingsworkwlan-
technologies-security-mechanisms_1301
Threats to Wireless Local Area Network (WLAN) and
Countermeasures” ,A.V.Dhaygude, K.R. Patil, A.A.Sawant
,ICONS’07,January 27-29,2007,Erode,Tamilnadu,India.
B.Forouzan, Data Communicat ion and Networking, McGraw Hill,
Fourt h Edit ion.
Potential Security Threats of a wireless network
http://www.infosecwriters.com/text_resources/pdf/Wireless_JMeyer.pdf
Suman Jana and Sneha Kumar Kasera. On fast and accurate detection of
unauthorized wireless access points using clock skews. In MobiCom
’08: Proceedings of the 14th ACM international conference on Mobile
computing and networking, pages 104–115. ACM, 2008.
Sushama Shrike, S. B. Vanjale, B.V.D.U, Pune (ROGUE ACCESS
POINT DETECTION USING TIME STAMP) Jun-2011 vol 2.
The Method of Least squares:
http://www.efunda.com/math/leastsquares/leastsquares.cfm
Man-in-the-middle attack- the IT Law wiki:
http://it.toolbox.com/wiki/index.php/Man-in-the-Middle_Attack
Wikipedia Man in Middle attack: http://en.wikipedia.org/wiki/Man-inthe-
middle_attack
Wikipedia (Wireless LAN): http://en.wikipedia.org/wiki/Wireless_LAN
Security Standards:
http://www.sans.org/reading_room/whitepapers/wireless/overview-
-wireless-network-security-standards-mechanisms_1530
Wireless LAN: Security Issues and Solutions:
http://www.sans.org/reading_room/whitepapers/wireless/wireless-lansecurity-
issues-solutions_1009
Wireless security: http://en.wikipedia.org/wiki/Wireless_security
WEP (Wired equivalent Privacy):
http://www.networkworld.com/details/715.html
Lanier Watkins, Raheem Beyah, Cherita Corbett “A Passive Approach
to Rogue Access Point Detection” 1930-529X/07/$25.00 © 2007 IEEE
Songrit Srilasak,, Kitti Wongthavarawat and Anan Phonphoem,
Intelligent Wireless Network Group (IWING) “Integrated Wireless
Rogue Access Point Detection and Counterattack System” published in
International Conference on Information Security and Assurance.
“AirMagnet:EnterpriseWLANmanagement.”[Online] Available:
http://www.airmagnet.com/
.NetStumbler, http://www.netstumbler.com.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.