Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points
Keywords:
Smartphone, Wireless, Rogue, Access Point, Beacon and Rogue Access PointAbstract
The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.
References
William Enck and Patrick McDaniel, October 2008. Understanding Android’s Security Framework. Systems and Internet Infrastructure Securities
Burns, Jessie., Mobile Application Security on Andriod. 2009. Black Hat, USA
Matthew Gast, 2002, 802.11 Wireless Networks: The Definitive Guide, O’Reilly, 2002
Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong and Tai-hoon Kim, Wireless Network Security: Vulnerabilities, Threats and Countermeasures, 2008. International Journal of Multimedia and Ubiquitous Engineering. Vol. 3, No. 3, July, 2008
The Pew Research Center. Internet & American Life Project Cell Internet Use. 2012. Available from: http://www.pewinternet.org/Reports/2012/CellInternet-Use-2012.aspx. (Accessed 23 January 2013)
Stalling, W., 2006. Cryptography and Network Security. 5th edition. Prentice Hall
Parthip, S., 2012. 802.11 Sniffer Capture Analysis -Management Frames and Open Auth. Available from https://supportforums.cisco.com/docs/DOC-24651. (Accessed 27 January 2013)
Geier, Jim, Identifying Rogue Access Points . 06 January 2006. Available from http://www.wifiplanet.com. (Accessed 13 December, 2012)
Wexler, Joanie, Do we really need rogue AP protection?. November 15, 2004. Available from http://www.networkworld.com/newsletters/wireless/index.html. (Accessed 3 February 2013)
Cisco Systems. 2006. Five steps to securing your wireless LAN and preventing wireless threats. Whitepaper, Copyright © 2006 Cisco Systems, Inc.
Cogen, David., December 1, 2011. How to root the Samsung Galaxy (all versions). Available from http://theunlockr.com/2011/12/01/how-to-root-thesamsung-galaxy--all-versions/. (Accessed 25 July, 2012)
John, A. 2011, What is rooting on Android. The advantages and disadvantages.
Shetty, Sachin., Song, Min., Ma, Liran., (2007), Rogue Access Point Detection by Analyzing Network Traffic Characteristics, IEEE Conference Publications
Ma, Liran., Teymonan, Amin Y., Cheng, Xinzhen (2008), A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks, IEEE INFOCOM 2008
Watkins, L., Beyah, R., Corbett, C., A passive approach to Rogue Access Point Detection using Traffic Round Trip Time
Vanderauwera, J., Bruinsma, L., Carlier, S. And Hassanmahomed, T., Compromising Wireless Security with Android, 31 December 2009.
The MathWorks Inc, IEEE 802.11 WLAN – Beacon Frame, Available from www.mathworks.com. (Accessed 24 January 2013)
GEIER, Jim, (n.d.). Beacons Revealed. Available from: www.wi-fiplanet.com. (Accessed 26 January, 2013)
m. Rouse, September 2005, timestamp, http://whatis.techtarget.com/definition/timestamp
Coleman, David. D and Westcott, David. A, CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 2012, John Wiley & Sons
http://www.wifiplanet.com/tutorials/article.php/1492071/80211- Beacons-Revealed.htm
Gupta, V. and Rohil, M. K., Information Embedding in IEEE 802.11 Beacon Frame, National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012 Proceedings published by International Journal of Computer
Applications® (IJCA)
Hostapd, Available from http://en.hostapd.org/wiki/Hostapd#Jouni_Malinen.27s_hostapd
hostapd, http://hostap.epitest.fi/
Mitchelle Bradley, WPA - WI-Fi Protected Access, Available from: http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.