Development of Device Identity using WIFI Layer 2 Management Frames for Combating Rogue APs

Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall

Research output: Contribution to conferencePaper

2 Citations (Scopus)
220 Downloads (Pure)

Abstract

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge
Original languageEnglish
Number of pages6
Publication statusPublished - 2013
EventInternational Conference on Security and Cryptography (SECRYPT) - Reykjavik, Iceland
Duration: 29 Jul 201331 Jul 2013

Conference

ConferenceInternational Conference on Security and Cryptography (SECRYPT)
CountryIceland
CityReykjavik
Period29/07/201331/07/2013

Keywords

  • WiFi
  • WLAN
  • Rogue AP
  • Managment Frames
  • MAC

Fingerprint Dive into the research topics of 'Development of Device Identity using WIFI Layer 2 Management Frames for Combating Rogue APs'. Together they form a unique fingerprint.

  • Cite this

    Milliken, J., Selis, V., Yap, K. M., & Marshall, A. (2013). Development of Device Identity using WIFI Layer 2 Management Frames for Combating Rogue APs. Paper presented at International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland. http://www.secrypt.icete.org/?y=2013