Browse > Article
http://dx.doi.org/10.5392/JKCA.2010.10.5.045

Detecting and Isolating a Cloned Access Point IEEE 802.11  

Go, Yun-Mi (단국대학교 전자계산학과 컴퓨터과학)
Kwon, Kyung-Hee (단국대학교 전자계산학과 컴퓨터과학)
Publication Information
Abstract
Appearance of a cloned AP(Access Point) causes MS(Mobile Station) to break an association with a normal AP(Access Point). If signal power of the cloned AP is stronger than that of the normal AP, MS associates with the cloned AP. Therefore, MS is easily exposed to attackers who installed the cloned AP. In this paper, we distinguish cloned AP from normal AP by using the association time and frame sequence number between normal AP and MS, then isolates the cloned AP. The simulation by NS-2 shows that our mechanism isolates efficiently a cloned AP and builds safer wireless LAN environment.
Keywords
Cloned AP; Wireless Network;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 S. Khan, N, Mast, K. K. Loo, and A. Silahuddin, "Cloned Access Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mash Networks," Journal of Information Assurance and Security(JIAS), ISSN: 1554-1010, Vol.3, No.4, pp.257-262, 2008(12).
2 "IEEE Standard for Information technology-Telecommunication and information exchange between systems-Local and metropolitan area netwokrs-Specific requirements Part 11 :Wireless LAN Medium Access Control (MAC) Security Enhancements," IEEE Std 802.11i-2004, pp.1-175, 2004.
3 IEEE802.11, "Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specification," 2007(6).
4 Network Research Group, Lawrence Berkeley Nation Laboratory Network simulator version 2(NS-2) URL: http://www.isi.edu/nsman/ns
5 전용희, “침입방지시스템(IPS)의 기술 분석 및 성능평가 방안”, 정보보호학회지, 제15권, 제2호, pp63-73, 2005.   과학기술학회마을
6 이형우, 최창원, “무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발”, 한국콘텐츠학회논문지, Vol.6, No.12, pp29-39, 2006.   과학기술학회마을
7 고윤미, 김진희, 권경희, “IEEE 802,11 네트워크에서의 복제된 AP 탐지 공격으로 부터의 방어 대책”, 한국 정보처리학회 추계학술발표대회 논문집, 제16권, 제2호, 2009(11).
8 S. Kahn. K-k.Loo, T. Naeem, and M. A. Khan, "Denial of service attacks and challenges in broadband wireless network," International Journal of Computer Science and Network Security, Vol.8, No.7, pp.1-6, 2008(7).
9 R. Cenkatesha Prasad, P. Pqwtczak, J. A. Hoffmeyer, and H. S. Berger, "Cognitive functionality in next generation wireless networks: Standardization efforts," IEEE Communication Magazine, Vol.46, Issue4, pp.72-78, 2008(4).
10 Rakesh Shrestha, S. D. Lee, D. Y. Choi, and S.J. Han, "Detecting jamming attacks in MANET,한국 해양정보통신학회논문지, 제13권, 제3호, pp.482-488.   과학기술학회마을
11 F. Ferreri, M. Bernaschi, and L. Valcamonici, "Access point vulnerabilities to DoS attacks in 802.11 networks," IEEE wireless Communications and Networking Conference, Vol.14, Issue2, pp159-169, 2008(3).