Open Access Open Access  Restricted Access Subscription or Fee Access

On Wireless Rogue Access Detection Using Clock Skew Method

Sandip Vanjale, Swati Jadhav

Abstract


Rogue Access Point (RAP) is an access point that has
been installed on a secure network without explicit authorization
from a system administrator. The major security thread for the
Wireless Networks is a presence of Rough access points. If this kind
of network threats are not detected and mitigated on time, those will
lead to the serious network damage and data loss. Finding and
avoiding rogue wireless access points is a main issued for every
organization. We use clock skew as a parameter of a wireless access
point (AP) to detect unauthorized AP’s. Using clock skews method to
detect Rogue access point in wireless LAN network overcomes the
limitations of existing solutions. We calculate the clock skew of an
AP from the IEEE 802.11 Time Synchronization Function (TSF) time
stamps sent out in the beacon/probe response frames. We use leastsquare
fit method for this purpose. Our results indicate that the use of
clock skews appears to be an effective and robust method for
detecting fake AP’s in wireless local area networks.


Keywords


AP, RAP, WLAN, WEP, RF Scanning, MAC Address, Man-in-Middle Attack, Clock Skew.

Full Text:

PDF

References


“How thing works: WLAN Technologies and security Mechanisms”

http://www.sans.org/reading_room/whitepapers/wireless/thingsworkwlan-

technologies-security-mechanisms_1301

Threats to Wireless Local Area Network (WLAN) and

Countermeasures” ,A.V.Dhaygude, K.R. Patil, A.A.Sawant

,ICONS’07,January 27-29,2007,Erode,Tamilnadu,India.

B.Forouzan, Data Communicat ion and Networking, McGraw Hill,

Fourt h Edit ion.

Potential Security Threats of a wireless network

http://www.infosecwriters.com/text_resources/pdf/Wireless_JMeyer.pdf

Suman Jana and Sneha Kumar Kasera. On fast and accurate detection of

unauthorized wireless access points using clock skews. In MobiCom

’08: Proceedings of the 14th ACM international conference on Mobile

computing and networking, pages 104–115. ACM, 2008.

Sushama Shrike, S. B. Vanjale, B.V.D.U, Pune (ROGUE ACCESS

POINT DETECTION USING TIME STAMP) Jun-2011 vol 2.

The Method of Least squares:

http://www.efunda.com/math/leastsquares/leastsquares.cfm

Man-in-the-middle attack- the IT Law wiki:

http://it.toolbox.com/wiki/index.php/Man-in-the-Middle_Attack

Wikipedia Man in Middle attack: http://en.wikipedia.org/wiki/Man-inthe-

middle_attack

Wikipedia (Wireless LAN): http://en.wikipedia.org/wiki/Wireless_LAN

Security Standards:

http://www.sans.org/reading_room/whitepapers/wireless/overview-

-wireless-network-security-standards-mechanisms_1530

Wireless LAN: Security Issues and Solutions:

http://www.sans.org/reading_room/whitepapers/wireless/wireless-lansecurity-

issues-solutions_1009

Wireless security: http://en.wikipedia.org/wiki/Wireless_security

WEP (Wired equivalent Privacy):

http://www.networkworld.com/details/715.html

Lanier Watkins, Raheem Beyah, Cherita Corbett “A Passive Approach

to Rogue Access Point Detection” 1930-529X/07/$25.00 © 2007 IEEE

Songrit Srilasak,, Kitti Wongthavarawat and Anan Phonphoem,

Intelligent Wireless Network Group (IWING) “Integrated Wireless

Rogue Access Point Detection and Counterattack System” published in

International Conference on Information Security and Assurance.

“AirMagnet:EnterpriseWLANmanagement.”[Online] Available:

http://www.airmagnet.com/

.NetStumbler, http://www.netstumbler.com.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.