当前位置: X-MOL 学术EURASIP J. Wirel. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis
EURASIP Journal on Wireless Communications and Networking ( IF 2.3 ) Pub Date : 2020-12-11 , DOI: 10.1186/s13638-020-01864-5
Songrit Kitisriworapan , Aphirak Jansang , Anan Phonphoem

Traditional rogue access-point (AP) detection mechanisms are employed in network administration to protect network infrastructure and organization; however, these mechanisms do not protect end users from connecting to a rogue-AP. In this paper, a rogue-AP detection technique on the mobile-user side is proposed. By using a simple method involving walking, the round-trip time (RTT) and the modulation and coding scheme values are obtained, and a more accurate transmission rate for particular RTT values is thereby calculated. Further, the cleansed data are classified using the k-means method and the cumulative distribution function for the detection process. The results demonstrate that a rogue-AP can be detected with an F-measure value of up to 0.9. In the future, the proposed algorithm can be implemented as an application installed on mobile devices so that nontechnical users can detect rogue-APs.



中文翻译:

使用简单的步行策略和往返时间分析的客户端流氓接入点检测

网络管理中采用了传统的恶意访问点(AP)检测机制来保护网络基础结构和组织。但是,这些机制不能保护最终用户避免连接到恶意AP。本文提出了一种在移动用户侧的恶意AP检测技术。通过使用涉及步行的简单方法,可以获得往返时间(RTT)以及调制和编码方案的值,从而计算出特定RTT值的更准确的传输速率。此外,使用k均值方法和用于检测处理的累积分布函数对清洗后的数据进行分类。结果表明,可以用高达0.9的F测量值检测到恶意AP。在将来,

更新日期:2020-12-12
down
wechat
bug