References
- J. Kim and I. Lee, "802.11 WLAN: history and new enabling MIMO techniques for next generation standards," IEEE Communications Magazine, vol. 53, no. 3, pp. 134-140, 2015. https://doi.org/10.1109/MCOM.2015.7060495
- F. H. Hsu, Y. L. Hsu, and C. S. Wang, "A solution to detect the existence of a malicious rogue AP," Computer Communications, vol. 142-143, pp. 62-68, 2019. https://doi.org/10.1016/j.comcom.2019.03.013
- Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: perspectives and challenges," Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014. https://doi.org/10.1007/s11276-014-0761-7
- P. Feng, "Wireless LAN security issues and solutions," in Proceedings of 2012 IEEE Symposium on Robotics and Applications, Kuala Lumpur, Malaysia, 2012, pp. 921-924.
- M. Waliullah and D. Gan, "Wireless LAN security threats and vulnerabilities," International Journal of Advanced Computer Science and Applications, vol. 5, no. 1, pp. 176-183, 2014.
- K. Gafurov and T. M. Chung, "Comprehensive survey on Internet of Things, architecture, security aspects, applications, related technologies, economic perspective, and future directions," Journal of Information Processing Systems, vol. 15, no. 4, pp. 797-819, 2019. https://doi.org/10.3745/JIPS.03.0125
- N. Y. Kim, S. Rathore, J. H. Ryu, J. H. Park, and J. H. Park, "A survey on cyber physical system security for IoT: Issues, challenges, threats, solutions," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1361-1384, 2018. https://doi.org/10.3745/JIPS.03.0105
- B. Alotaibi and K. Elleithy, "Rogue access point detection: taxonomy, challenges, and future directions," Wireless Personal Communications, vol. 90, no. 3, pp. 1261-1290, 2016. https://doi.org/10.1007/s11277-016-3390-x
- V. Gupta and M. K. Rohil, "Information embedding in IEEE 802.11 beacon frame," IJCA Proceedings of National Conference on Communication Technologies & Its Impact on Next Generation Computing, vol. 2012, no. 3 pp. 12-16, 2012.
- H. Siadati, "Prevention, detection, and reaction to cyber impersonation attacks," PhD dissertation, New York University, NY, 2019.
- A. Srinivasan and J. Wu, "VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins," International Journal of Security and Networks, vol. 13, no. 3, pp. 153-168, 2018. https://doi.org/10.1504/ijsn.2018.10014324
- Z. Tang, Y. Zhao, L. Yang, S. Qi, D. Fang, X. Chen, X. Gong, and Z. Wang, "Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes," Mobile Information Systems, vol. 2017, article no. 1248578, 2017.
- M. Agarwal, S. Biswas, and S. Nandi, "An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks," International Journal of Wireless Information Networks, vol. 25, no. 2, pp. 130-145, 2018. https://doi.org/10.1007/s10776-018-0396-1
- S. Jana and S. K. Kasera, "On fast and accurate detection of unauthorized wireless access points using clock skews," IEEE Transactions on Mobile Computing, vol. 9, no. 3, pp. 449-462, 2009. https://doi.org/10.1109/TMC.2009.145
- C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz, "On the reliability of wireless fingerprinting using clock skews," in Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken, NJ, 2010, pp. 169-174.
- T. Kim, H. Park, H. Jung, and H. Lee, "Online detection of fake access points using received signal strengths," in Proceedings of 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), Yokohama, Japan, 2012, pp. 1-5.
- J. W. Lee, S. Y. Lee, and J. S. Moon, "Detecting rogue AP using k-SVM method," Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 87-95, 2014. https://doi.org/10.13089/JKIISC.2014.24.1.87
- S. B. Vanjale and P. B. Mane, "Multi parameter based robust and efficient rogue AP detection approach," Wireless Personal Communications, vol. 98, no. 1, pp. 139-156, 2018. https://doi.org/10.1007/s11277-017-4860-5
- S. Kang, D. Nyang, and K. Lee, "Evil-twin detection scheme using SVM with multi-factors," Journal of the Korean Institute of Communications and Information Sciences, vol. 40, no. 2, pp. 334-348, 2015. https://doi.org/10.7840/kics.2015.40.2.334