Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing

Print
PDF
IJCA Proceedings on National Conference on Advancements in Computer & Information Technology
© 2016 by IJCA Journal
NCACIT 2016 - Number 2
Year of Publication: 2016
Authors:
Prachi M. Kharat
N. D. Kale

Prachi M Kharat and N d Kale. Article: Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing. IJCA Proceedings on National Conference on Advancements in Computer & Information Technology NCACIT 2016(2):1-5, May 2016. Full text available. BibTeX

@article{key:article,
	author = {Prachi M. Kharat and N.d. Kale},
	title = {Article: Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing},
	journal = {IJCA Proceedings on National Conference on Advancements in Computer & Information Technology},
	year = {2016},
	volume = {NCACIT 2016},
	number = {2},
	pages = {1-5},
	month = {May},
	note = {Full text available}
}

Abstract

In presently a day's remote (wireless) LAN is broadly utilized as a part of many public open spaces. Wireless access points expand wired network. It gives more flexibility to the clients. One of the fundamental concerns is that of Rogue Access Points (RAP). These security threads which bring about extreme damage to hierarchical information and assets could be because of inside or outer cause. Access point could be one reason which might permit attackers to break the security of authoritative system and permit them to get to sensitive data from system. The access points deployed without clear and definite permission from network administrator are called unauthorized, fake or rogue access point. There are numerous chances of presences of RAP in LAN data. Rogue Access Points (RAPs) is one of the foremost security threats in current network scenario, if not properly handled in time could lead from slight network faults to serious network failure. Most of the current solutions to detect rogue access points are not automatic and are dependent on a specific wireless technology. In this paper, we propose a Multi-Agent Based Methodology, which not only identifies Rogue Access Point but also completely eliminates it. This Methodology has the following exceptional properties: (1) it doesn't require any specialized hardware; (2) the proposed algorithm detects and totally removes the RAPs from network; (3) it provides a cost-effective solution. The proposed technique can block RAPs as well as eliminate them from the networks both in form of Unauthorized APs or as a Rogue Clients Acting as APs.

References

  • Prof. Sandeep Vanjale, Dr. P. B. Mane, "A Novel approach for Elimination of Rogue Access Point in Wireless Network",IEEE,2014.
  • Hao Han, Fengyuan Xu, Chiu C. Tan,Yifan Zhang, and Qun Li, "VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet", IEEE trans. , Vol. 63, No. 8,October 2014.
  • Liran Ma,AminY. Teymorian, Xiuzhen Cheng "A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks"publishedin the IEEE INFOCOM 2008
  • M. K. Nivangune, Prof. S. B. Vanjale, Dr. P. B. Mane,"Detecting Unauthorized Access Point in WLAN by using CTT", IJARCSSE, vol 5, Issue 7, July 2015.
  • Mrs. Fatima D. Mulla, Mr. Sandeep Vanjale, Prof. Dr. P. B. Mane " PROVIDING DATA SECURITY FOR WI-FI NETWORK USING MOBILE AGENT IN DISTRIBUTED SYSTEM" International Journalof Advanced Engineering Technology E-ISSN 0976-3945 IJAET/Vol. III/ Issue II/April-June, 2012/127-130 Research Article.
  • Prof. Suryawanshi Govind R,Prof. S. B. Vanjale "Architecture of mobile agent for Distributed rogue access point detection in distributed system" CSCIT,Nanded on09Jan2010.
  • MohanK Chirumamilla,Byrav Ramamurthy"Agent Based Intrusion Detection and Response System for Wireless LANs"CSE
  • Lanier Watkins, Raheem Beyah, Cherita Corbett "A Passive Approach to Rogue Access Point Detection"1930-529X/07/$25. 00 © 2007 IEEE
  • Songrit Srilasak,, Kitti Wongthavarawat and Anan Phonphoem, Intelligent Wireless Network Group(IWING) "Integrated Wireless Rogue Access Point Detection and Counterattack System"publishedin2008 International Conference on Information Security andAssurance.
  • V. S. Shankar Sriram,G. Sahoo "A Mobile Agent Based Architecture for Securing WLANs" International Journal of RecentTrendsinEngineering, Vol 1, No. 1, May2009
  • MS. Snehal Behede,S. B. Vanjale,P. B. Mane"Provoding data security in WLAN by detecting unauthorized access points and attacks"Intenational JournalOf Engineering Science And Technology.
  • NetStumbler- http://www. netstumbler. com
  • AirMagnet-http://www. airmagnet. com
  • http://www. softpedia. com/get/Network-Tools/Network-Monitoring/NetStumbler. shtml
  • http://www. leger. ca/pages/CHAMPLAIN/WLAN-tools. htm
  • www. ias. ac. in/resonance/July2002/pdf/July2002p35-43. pdf
  • http://www. kismetwireless. net