to detect Rogue APs using the following method: 1)
Client connects to a legitimate AP, 2) After the
training time has bypassed the client has created the
AP fingerprint, 3) Should a Rogue AP now appear,
the client will be able to distinguish the new
fingerprint even if the Rogue AP masquerades all
available attributes of the legitimate AP.
This process would have to be carried out every
time a client connects to an AP, even if the
fingerprint has been previously known. Only one
visit to an AP is required to generate the fingerprint,
however due to the channel characteristics changing
with location and time they must be generated on
every new connection. Accounting for user mobility
remains for future work. This technique could be
used in addition to alternative Rogue AP detection
techniques to improve detection confidence.
4 CONCLUSIONS
Rogue APs present a significant threat to public
WiFi infrastructures and their users, which current
detection systems aim to defeat by monitoring
differences in RSSI. These systems are shown to be
insufficient by other research works. This work
presents a new method of determining identification
for WiFi APs, employing a combination of WiFi
packet average intervals for beacons and probe
exchanges to gauge identifying averages for APs.
This layer 2 information has been shown to be
received differently at different distances and
orientations to the source of the traffic, which can be
used to attribute identity to a specific AP from that
collection location.
The fingerprinting technique employed here is
dependent on two characteristics, 1) AP – user
channel and 2) Internal AP processing. Assessing
the relative contribution to fingerprinting of these
two attributes remains for future work. Attribution
of this identity system has been shown to be
available in a live location for up to 99% of
operational lifetime potentially within 9 seconds of
client-AP connection.
ACKNOWLEDGEMENTS
The authors gratefully acknowledge the assistance of
EPRSC (grant number EP/H004793/1), Sunway
University (grant number INT-SCT-0111-03) and
Sunway Pyramid management.
REFERENCES
Beyah, R., et al., 2004, Rogue Access Point Detection
using Temporal Traffic Characteristics. In
GLOBECOM ’04, IEEE Global Telecommunications
Conference.
Beyah, R., Venkataraman, A., 2011. Rogue Access Point
Detection: Challenges, Solutions and Future
Directions. IEEE Journal of Security & Privacy (9/5),
pp. 56-61.
Faria, D. B., Cheriton, D. R., 2006. Detecting Identity-
Based Attacks in Wireless Networks Using
Signalprints. In 5th ACM Workshop on Wireless
Security.
Franklin, J., et al., 2006. Passive Data Link Layer 802.11
Wireless Device Driver Fingerprinting. In 15th
USENIX Security Symposium.
Ma, L., et al., 2007. RAP: Protecting Commodity WiFi
Networks from Rogue Access Points. In 4
th
Intl. Conf.
on Heterogeneous Networking for Quality, Reliability,
Security and Robustness & Workshops.
Ma L., et al., 2008. A Hybrid Rogue Access Point
Protection Framework for Commodity WiFi
Networks. In INFOCOM ’08, 27th Intl. Conf. on
Computer Communications.
Milliken, J., Marshall, A., 2012. Design and Analysis of
an Independent, Layer 2, Open-Access WiFi
Monitoring Infrastructure in the Wild. In ICWN ’12,
International Conference on Wireless Networks.
Milliken, J., et al., 2012. The Effect of Probe Interval
Estimation on Attack Detection Performance of a
WLAN Independent Intrusion Detection System. In
ICWCA ’12, International Conference on Wireless
Communications and Applications.
Nagarajan, V., et al., 2010. Using Power Hoping to
Counter MAC Spoofing Attacks in WLAN. In 7th
IEEE Consumer Communications and Networking
Conference.
Percoco N. J., 2010. Trustwave Global Security Report
2010. Trustwave, Chicago, USA Shetty, S., et al.,
2007. Rogue Access Point Detection By Analysing
Networking Traffic Characteristics. In MILCOM ’07,
IEEE Military Conference.
Shivaraj, G., et al., 2008. A Hidden Markov Model Based
Approach to Detect Rogue Access Points. In
MILCOM ‘08, IEEE Military Conference.
Tao, Z., et al., 2008. X-mode: A real Time Approach of
Discriminating WiFi Networking Impersonators. In
NWESP ’08, 4th International Conference on Next
Generation Web Services Practices.
DevelopmentofDeviceIdentityusingWiFiLayer2ManagementFramesforCombatingRogueAPs
493