Introduction to IEEE 802.11 Rogue Access Point Detection Mechanism Using Covert Channel

Abstract

The problem of providing protection to the user from a rogue access point is a big problem today. To protect against the rogue access point through existing mechanism is by using IEEE 802.1x. However, it is difficult to use and impossible to quest. So, we are proposing a mechanism that will allow the users to protect their terminals before connecting to the rogue access points. This project presents the concept of access point authentication in terminals using covert channel over Transport Layer of TCP/IP reference model and it uses the timestamp field of beacon frame. So, in this project we are showing that without breaching the original standard of the frame, we can embed non-standard information on the timestamp field of 802.11 beacon frame.

Authors and Affiliations

Prof. Kiran Somase, Akshay R. Shelke, Ankita S. Bhise, Rajat R. Balpande, Sagar D. Bhusari

Keywords

Related Articles

Factors Influencing Non- Motorized Mode Choice: A Review

Q automobile travel by reducing traffic congestion and air/noise pollution. Their modal share is decreasing in developing countries day-by-day which is evident from the data collected by different organizations. At pres...

Optimization of Forming Process Parameters for Appropriate Distribution of Wall Thickness in Sheet Metal Component

While obtaining the final sheet metal component the defects are occurred in sheet metal forming process which are reduced by varying the forming process parameters by trial and error method. This causes loss in terms of...

slugDESIGNING OF REGIONAL TRUSTED AUTHORITY WITH LOCATION BASED SERVICE DISCOVERY PROTOCOL IN VANET

VANET is a form of Mobile Ad - Hoc Network or MANET and its different from MANET due to high mobility of nodes and the large scale of networks. The proposed location based service discovery pro...

High Density of Noise Removal Using FBD Filter

This research work has been done on data mining for noise type detection and filtering process to ample more effectiveness for removing the noise content in an image. In this article we have proposed a scheme of data mi...

Designing Logistics information System: Theoretical Background and Literature Review

Logistics is the system of people and things that are involved in getting a product from the place where it is made to the person who buys it. Information system is an interactive structure of people, equipment, methods...

Download PDF file
  • EP ID EP24345
  • DOI -
  • Views 307
  • Downloads 11

How To Cite

Prof. Kiran Somase, Akshay R. Shelke, Ankita S. Bhise, Rajat R. Balpande, Sagar D. Bhusari (2017). Introduction to IEEE 802.11 Rogue Access Point Detection Mechanism Using Covert Channel. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://www.europub.co.uk/articles/-A-24345