scholarly journals AN ATTACK SCENARIO USING A ROGUE ACCESS POINT IN IEEE 802.11 NETWORKS

2021 ◽  
Vol 3 (11) ◽  
pp. 144-154
Author(s):  
Roman Korolkov

One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.

Author(s):  
S. B. Vanjal ◽  
Amol K. Kadam ◽  
Pramod A. Jadhav

Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific wireless technology. In this paper we propose the integrated solution for detection and eliminate the rogue access points. Rogue detection algorithm is also proposed. This Methodology has the following properties: (1) it doesn’t require any specialized hardware; (2) the proposed algorithm detects and completely eliminates the RAPs from network; Our proposed solution is effective and low cost.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Qian Lu ◽  
Haipeng Qu ◽  
Yuzhan Ouyang ◽  
Jiahui Zhang

In general, the IEEE 802.11 network identifiers used by wireless access points (APs) can be easily spoofed. Accordingly, a malicious adversary is able to clone the identity information of a legitimate AP (LAP) to launch evil twin attacks (ETAs). The evil twin is a class of rogue access point (RAP) that masquerades as a LAP and allures Wi-Fi victims’ traffic. It enables an attacker with little effort and expenditure to eavesdrop or manipulate wireless communications. Due to the characteristics of strong concealment, high confusion, great harmfulness, and easy implementation, the ETA has become one of the most severe security threats in Wireless Local Area Networks (WLANs). Here, we propose a novel client-side approach, Speical Length Frames Arrival Time (SLFAT), to detect the ETA, which utilizes the same gateway as the LAP. By monitoring the traffic emitted by target APs at a detection node, SLFAT extracts the arrival time of the special frames with the same length to determine the evil twin’s forwarding behavior. SLFAT is passive, lightweight, efficient, hard to be escaped. It allows users to independently detect ETA on ordinary wireless devices. Through implementation and evaluation in our study, SLFAT achieves a very high detection rate in distinguishing evil twins from LAPs.


Sensors ◽  
2018 ◽  
Vol 18 (7) ◽  
pp. 2247 ◽  
Author(s):  
Pilar Manzanares-Lopez ◽  
Josemaria Malgosa-Sanahuja ◽  
Juan Muñoz-Gea

In this paper, the concept of SDN (Software Defined Networking) is extended to be applied to wireless networks. Traditionally, in a wired SDN environment, the OpenFlow protocol is the communication protocol used to configure the flow table of forwarding elements (i.e., switches and Access Points). However, although in IEEE 802.11 networks there is no concept of forwarding, the SDN paradigm could also be applied to set up the wireless network dynamically, in order to improve the performance. In this case, not only the network elements, that is the Access Points, but also the mobile elements should configure their link and physical layers parameters following the guidelines of a centralized SDN controller. In particular, we propose a mechanism called DEDCA (Dynamic Enhanced Distributed Channel Access) to manage the channel access in wireless networks, and a framework that enables its implementation in 802.11-based wireless networks using SDN technology. The key aspect of this alternative solution is the control over the contention window size of the wireless terminals. Thus, an adequate response to dynamic and short-term Quality of Service (QoS) requirements can be offered to services running on these networks. DEDCA mechanism relies upon the use of a scalar parameter called gain. The mathematical model which has allowed us to obtain this parameter is presented and evaluated in this paper. Finally, the usefulness of the proposed solutions have been evaluated by means of their implementation in an example case.


T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


Author(s):  
Marion Olubunmi Adebiyi ◽  
Egbe Egbe Adeka ◽  
Florence A. Oladeji ◽  
Roseline Oluwaseun Ogundokun ◽  
Micheal Olaolu Arowolo ◽  
...  

<span>Wireless networks came into the computing world replacing the costlier and more complex wired method of connecting numerous equipment in the same or different location via the use of cables. It provides the user devices a connection to one another and the greater internet via connections to access points. Generally, 802.11 access point products follow a default strongest signal first approach in selecting user devices or nodes to connect to the access point or overlapping access points. This standard does not make provisions for even distribution of load and hence the quality of service and the throughput in areas of congestion would be reduced. This article brings forward two algorithms used in load balancing and they include round-robin technique and the weighted round-robin technique to be used in the simulation of the distribution of the load amongst the access points with the results collated and compared to clearly show which algorithm is best suited to be used as a standard for access point load distribution.</span>


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2076
Author(s):  
Rosario G. Garroppo ◽  
Gianfranco Nencioni ◽  
Luca Tavanti ◽  
Bernard Gendron ◽  
Maria Grazia Scutellà

In this paper, we present an approach and an algorithm aimed at minimising the energy consumption of enterprise Wireless Local Area Networks (WLANs) during periods of low user activity. We act on two network management aspects: powering off some Access Points (APs), and choosing the level of transmission power of each AP. An efficient technique to allocate the user terminals to the various APs is the key to achieving this goal. The approach has been formulated as an integer programming problem with nonlinear constraints, which comes from a general but accurate characterisation of the WLAN. This general problem formulation has two implications: the formulation is widely applicable, but the nonlinearity makes it NP-hard. To solve this problem to optimality, we devised an exact algorithm based on a customised version of Benders’ decomposition method. The computational results proved the ability to obtain remarkable power savings. In addition, the good performance of our algorithm in terms of solving times paves the way for its future deployment in real WLANs.


2013 ◽  
Vol 846-847 ◽  
pp. 463-468
Author(s):  
Xian Long Chen ◽  
Li Jiao Liang

In this paper, we study the problem of enhancing the fault tolerance of IEEE 802.11 wireless local area networks in the design stage. We aim to settle proper number of access points (APs) and carefully locate them, such that the system can tolerate AP failures while guaranteeing QoS requirement. Given a set of clients (end-users), each client has a traffic demand for Internet access. The problem of our concern is to find out the minimal number of access points and proper location, such that the fault tolerance and QoS constraint are both satisfied. That is, when there is no AP failure, the actual traffic delivery ratio for each client shall exceed the threshold. When their happens that one AP failed, the clients it served can switch to other APs with reconfiguration of the system, while providing an acceptable bandwidth. We proposed a heuristic algorithm, firstly we place one AP in each candidate place and gradually decrease the APs until no more APs can be deleted, in each step we make fault tolerance checking. Our proposed method can effectively solve the problem of tolerating to access point failure in the design phase of wireless local area networks. Simulations are conducted to show the performance of our proposed method.


2021 ◽  
Vol 11 (1) ◽  
pp. 1-13
Author(s):  
Sumon Kumar Debnath ◽  
Prodip Kumar Sarker ◽  
Md. Manowarul Islam ◽  
Ileas Pramanik

For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of network behavior is critical in designing high-performance WLANs. Through testing, analysis, and modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small budget before making its practical implementation. Many network simulation tools have been established to give solutions for this request and ns-3 is the most widely used tools among them by the research industry as an open-source network simulator. In this paper, we examine the various link features of the 802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame aggregation, data encoding, number of antennas and their data rate, and link distance features of 802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.


Sign in / Sign up

Export Citation Format

Share Document