Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points

Abstract

The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

Description

This is a journal article whose case study many focuses on Android Rogue access points.

Citation

Nyathi, T. and Nldovu, S., 2014. Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points. An international journal of advanced computer technology, 3(2), pp.576–581.

Endorsement

Review

Supplemented By

Referenced By