Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points
Loading...
Date
2014-02
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Compusoft
Abstract
The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.
Description
This is a journal article whose case study many focuses on Android Rogue access points.
Keywords
Smartphone, Wireless, Rogue, Access Point, Beacon and Rogue Access Point
Citation
Nyathi, T. and Nldovu, S., 2014. Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points. An international journal of advanced computer technology, 3(2), pp.576–581.