Online Submission!

Open Journal Systems

BEACON FRAME MANIPULATION TO MITIGATE ROGUE ACCESS POINTS: CASE OF ANDROID SMARTPHONE ROGUE ACCESS POINTS

Thambo Nyathi, Siqabukile Ndlovu

Abstract


The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

Full Text:

PDF

References


William Enck and Patrick McDaniel, October 2008. Understanding Android’s Security Framework. Systems and Internet Infrastructure Securities

Burns, Jessie., Mobile Application Security on Andriod. 2009. Black Hat, USA

Matthew Gast, 2002, 802.11 Wireless Networks: The Definitive Guide, O’Reilly, 2002

Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong and Tai-hoon Kim, Wireless Network Security: Vulnerabilities, Threats and Countermeasures, 2008. International Journal of Multimedia and Ubiquitous Engineering. Vol. 3, No. 3, July, 2008

The Pew Research Center. Internet & American Life Project Cell Internet Use. 2012. Available from: http://www.pewinternet.org/Reports/2012/Cell-Internet-Use-2012.aspx. (Accessed 23 January 2013)

Stalling, W., 2006. Cryptography and Network Security. 5th edition. Prentice Hall

Parthip, S., 2012. 802.11 Sniffer Capture Analysis - Management Frames and Open Auth. Available from https://supportforums.cisco.com/docs/DOC-24651. (Accessed 27 January 2013)

Geier, Jim, Identifying Rogue Access Points. 06 January 2006. Available from http://www.wi-fiplanet.com. (Accessed 13 December, 2012)

Wexler, Joanie, Do we really need rogue AP protection?. November 15, 2004. Available from http://www.networkworld.com/newsletters/wireless/index.html. (Accessed 3 February 2013)

Cisco Systems. 2006. Five steps to securing your wireless LAN and preventing wireless threats. Whitepaper, Copyright © 2006 Cisco Systems, Inc.

Cogen, David., December 1, 2011. How to root the Samsung Galaxy (all versions). Available from http://theunlockr.com/2011/12/01/how-to-root-the-samsung-galaxy--all-versions/. (Accessed 25 July, 2012)

John, A. 2011, What is rooting on Android. The advantages and disadvantages.

Shetty, Sachin., Song, Min., Ma, Liran., (2007), Rogue Access Point Detection by Analyzing Network Traffic Characteristics, IEEE Conference Publications

Ma, Liran., Teymonan, Amin Y., Cheng, Xinzhen (2008), A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks, IEEE INFOCOM 2008 [15] Watkins, L., Beyah, R., Corbett, C., A passive approach to Rogue Access Point Detection using Traffic Round Trip Time

Vanderauwera, J., Bruinsma, L., Carlier, S. And Hassanmahomed, T., Compromising Wireless Security with Android, 31 December 2009.

The MathWorks Inc, IEEE 802.11 WLAN – Beacon Frame, Available from www.mathworks.com. (Accessed 24 January 2013)

GEIER, Jim, (n.d.). Beacons Revealed. Available from: www.wi-fiplanet.com. (Accessed 26 January, 2013)

m. Rouse, September 2005, timestamp, http://whatis.techtarget.com/definition/timestamp [20] Coleman, David. D and Westcott, David. A, CWNA: Certified Wireless Network Administrator Official Study Guide: Exam PW0-105, 2012, John Wiley & Sons

http://www.wi-fiplanet.com/tutorials/article.php/1492071/80211-Beacons-Revealed.htm

Gupta, V. and Rohil, M. K., Information Embedding in IEEE 802.11 Beacon Frame, National Conference on Communication Technologies & its impact on Next Generation Computing CTNGC 2012 Proceedings published by International Journal of Computer Applications® (IJCA)

Hostapd, Available from http://en.hostapd.org/wiki/Hostapd#Jouni_Malinen.27s_hostapd

hostapd, http://hostap.epitest.fi/

Mitchelle Bradley, WPA - WI-Fi Protected Access, Available from: http://compnetworking.about.com/cs/wirelesssecurity/g/bldef_wpa.htm




DOI: http://dx.doi.org/10.6084/ijact.v3i2.260

Refbacks

  • There are currently no refbacks.




Copyright (c) 2015 COMPUSOFT "An International Journal of Advanced Computer Technology"