Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points
dc.contributor.author | Nyathi, Thambo | |
dc.contributor.author | Ndlovu, Siqabukile | |
dc.date.accessioned | 2014-12-17T07:15:18Z | |
dc.date.accessioned | 2023-06-26T13:07:15Z | |
dc.date.available | 2014-12-17T07:15:18Z | |
dc.date.available | 2023-06-26T13:07:15Z | |
dc.date.issued | 2014-02 | |
dc.description | This is a journal article whose case study many focuses on Android Rogue access points. | en_US |
dc.description.abstract | The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points. | en_US |
dc.identifier.citation | Nyathi, T. and Nldovu, S., 2014. Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points. An international journal of advanced computer technology, 3(2), pp.576–581. | en_US |
dc.identifier.issn | 2320-0790 | |
dc.identifier.uri | http://196.220.97.103:4000/handle/123456789/451 | |
dc.language.iso | en | en_US |
dc.publisher | Compusoft | en_US |
dc.rights.license | This article was downloaded from NUST Institutional repository, and is made available under the terms and conditions as set out in the Institutional Repository Policy. | en_US |
dc.subject | Smartphone | en_US |
dc.subject | Wireless | en_US |
dc.subject | Rogue | en_US |
dc.subject | Access Point | en_US |
dc.subject | Beacon and Rogue Access Point | en_US |
dc.title | Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Beacon Frame Manipulation to Mitigate Rogue Access Points Case of Android.pdf
- Size:
- 353.82 KB
- Format:
- Adobe Portable Document Format
- Description:
- Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points
License bundle
1 - 1 of 1