Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.8.632

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device  

Park, Jungsoo (숭실대학교 전자공학과 통신망보안 연구실)
Park, Minho (숭실대학교 정보통신전자공학부)
Jung, Souhwan (숭실대학교 정보통신전자공학부 통신망보안 연구실)
Abstract
In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.
Keywords
WLAN security; Rogue AP; Remote Server; BYOD; Whitelist;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L. Liu, R. Moulic, and D. Shea, "Cloud service portal for mobile device management," in Proc. IEEE 7th Int. Conf. e-Business Eng. (ICEBE), pp. 474-478, Shanghai, China, Nov. 2010.
2 A. Scarfò, "New security perspectives around BYOD," in Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446-451, Victoria, Canada, Nov. 2012.
3 G. Chen, H. Yao, and Z. Wang, "An intelligent WLAN intrusion prevention system based on signature detection and plan recognition," In Proc. 2nd Int. Conf. Future Networks (ICFN '10), pp. 168-172, Sanya, China, Jan. 2010.
4 H.-W. Lee and C.-W. Choi, "Development of malicious traffic detection and prevention system by embedded module on wireless LAN access point," J. Korea Contents Assoc. (KOCON), vol. 6, no. 12, pp. 29-39, Dec. 2006.   과학기술학회마을
5 H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011.   DOI   ScienceOn
6 J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://http://www.windowsecurity.com/whitepapers/Wireless_Security/Wireless-Security-Attacks-Defenses.html.
7 D. Inoue, R. Nomura, and M. Kuroda, "Transient MAC address scheme for untraceability and DOS attack resiliency on wireless network," in Proc. Wireless Telecommun. Symp., pp. 15-23, Pomona, U.S.A., Apr. 2005.
8 AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
9 H. Hwang, G. Jung, K. Sohn, and S. Park "A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP," in Proc. Int. Conf. Inform. Sci. Security (ICISS '08), pp. 164-170, Hyderabad, India, Jan. 2008.