Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/459897
Title: An Experimental Study and Novel Approach for Detection and Suppression of Rogue Access Point in Wlan
Researcher: Patel Kashyapkumar Chaitanyakumar
Guide(s): Dr. Ajaykumar M. Patel
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Ganpat University
Completed Date: 2022
Abstract: Research into wireless network communication is vast, and many wireless security companies and organisations have failed to achieve wireless airspace accuracy because of its narrow, limited, and restricted capacity to network teams. Information transmitted through a wireless network uses radio frequency. Antennas, routers, access points, Wi-Fi cards, and more must all be 802.11 compliant to make up a WLAN. Data transmission, encoding, and decoding are all taken care of by 802.11-compliant WLAN parts. Annual pen-testing for acceptability, especially for public Wi-Fi, will become unnecessary as the number of wireless attacks rises. Any computer or laptop with an integrated Wi-Fi network adapter and access to the internet is vulnerable to hackers while using a public Wi-Fi network. Infections spread rapidly through public WLANs. This study compares and contrasts the key characteristics and terminology of a rogue access point (a WLAN threat) with those of an Access Point, the dangers of a rogue AP for public Wi-Fi, the relationship between rogue APs and attacks, and the various ways in which a rogue AP could carry out malicious actions or launch attacks against a next-generation wireless network. The conventional approach centres on comparing several parameters taken from beacon frames. The MAC address and SSID of the access point are examined, among other things. A server-based technique involves installing RAP detection software on a centralised server, which then performs an operation over the entire network in search of RAP. By contrast, a client-based approach relies on the device itself to monitor the network and verify the authenticity of an access point (AP) before establishing a connection with it. To name just a few, recent studies make use of clock skew, wireless traffic monitoring, encryption, authorization, a timing-based technique, RSS analysis, bottleneck bandwidth analysis, and sequential hypothesis testing. Some issues with current methods include: reliance on a faulty clock skew solution assumption;
Pagination: 6362kb
URI: http://hdl.handle.net/10603/459897
Appears in Departments:Faculty of Computer Applications

Files in This Item:
File Description SizeFormat 
10_list of figures.pdfAttached File79.3 kBAdobe PDFView/Open
11_abbreviations.pdf32.84 kBAdobe PDFView/Open
12_chapter 1.pdf353.83 kBAdobe PDFView/Open
13_chapter 2.pdf523.59 kBAdobe PDFView/Open
14_chapter 3.pdf1.85 MBAdobe PDFView/Open
15_chapter 4.pdf744.83 kBAdobe PDFView/Open
16_chapter 5.pdf2.55 MBAdobe PDFView/Open
17_publications.pdf121.89 kBAdobe PDFView/Open
1_title page.pdf93.26 kBAdobe PDFView/Open
2_certificate by research guide.pdf52.38 kBAdobe PDFView/Open
3_pre-synopsis certificate by guide.pdf112.13 kBAdobe PDFView/Open
5_declaration by candidate.pdf52.19 kBAdobe PDFView/Open
6_table of content.pdf80.03 kBAdobe PDFView/Open
80_recommendation.pdf52.12 kBAdobe PDFView/Open
8_abstract.pdf9.96 kBAdobe PDFView/Open
9_list of tables.pdf6.38 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: