Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/459897
Title: | An Experimental Study and Novel Approach for Detection and Suppression of Rogue Access Point in Wlan |
Researcher: | Patel Kashyapkumar Chaitanyakumar |
Guide(s): | Dr. Ajaykumar M. Patel |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Ganpat University |
Completed Date: | 2022 |
Abstract: | Research into wireless network communication is vast, and many wireless security companies and organisations have failed to achieve wireless airspace accuracy because of its narrow, limited, and restricted capacity to network teams. Information transmitted through a wireless network uses radio frequency. Antennas, routers, access points, Wi-Fi cards, and more must all be 802.11 compliant to make up a WLAN. Data transmission, encoding, and decoding are all taken care of by 802.11-compliant WLAN parts. Annual pen-testing for acceptability, especially for public Wi-Fi, will become unnecessary as the number of wireless attacks rises. Any computer or laptop with an integrated Wi-Fi network adapter and access to the internet is vulnerable to hackers while using a public Wi-Fi network. Infections spread rapidly through public WLANs. This study compares and contrasts the key characteristics and terminology of a rogue access point (a WLAN threat) with those of an Access Point, the dangers of a rogue AP for public Wi-Fi, the relationship between rogue APs and attacks, and the various ways in which a rogue AP could carry out malicious actions or launch attacks against a next-generation wireless network. The conventional approach centres on comparing several parameters taken from beacon frames. The MAC address and SSID of the access point are examined, among other things. A server-based technique involves installing RAP detection software on a centralised server, which then performs an operation over the entire network in search of RAP. By contrast, a client-based approach relies on the device itself to monitor the network and verify the authenticity of an access point (AP) before establishing a connection with it. To name just a few, recent studies make use of clock skew, wireless traffic monitoring, encryption, authorization, a timing-based technique, RSS analysis, bottleneck bandwidth analysis, and sequential hypothesis testing. Some issues with current methods include: reliance on a faulty clock skew solution assumption; |
Pagination: | 6362kb |
URI: | http://hdl.handle.net/10603/459897 |
Appears in Departments: | Faculty of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10_list of figures.pdf | Attached File | 79.3 kB | Adobe PDF | View/Open |
11_abbreviations.pdf | 32.84 kB | Adobe PDF | View/Open | |
12_chapter 1.pdf | 353.83 kB | Adobe PDF | View/Open | |
13_chapter 2.pdf | 523.59 kB | Adobe PDF | View/Open | |
14_chapter 3.pdf | 1.85 MB | Adobe PDF | View/Open | |
15_chapter 4.pdf | 744.83 kB | Adobe PDF | View/Open | |
16_chapter 5.pdf | 2.55 MB | Adobe PDF | View/Open | |
17_publications.pdf | 121.89 kB | Adobe PDF | View/Open | |
1_title page.pdf | 93.26 kB | Adobe PDF | View/Open | |
2_certificate by research guide.pdf | 52.38 kB | Adobe PDF | View/Open | |
3_pre-synopsis certificate by guide.pdf | 112.13 kB | Adobe PDF | View/Open | |
5_declaration by candidate.pdf | 52.19 kB | Adobe PDF | View/Open | |
6_table of content.pdf | 80.03 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 52.12 kB | Adobe PDF | View/Open | |
8_abstract.pdf | 9.96 kB | Adobe PDF | View/Open | |
9_list of tables.pdf | 6.38 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: