Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP 


Vol. 40,  No. 3, pp. 551-558, Mar.  2015


PDF
  Abstract

As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

R. Jang, J. Kang, D. Nyang, K. Lee, "Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 551-558, 2015. DOI: .

[ACM Style]

Rhong-Ho Jang, Jeon-Il Kang, Dae-Hun Nyang, and Kyung-Hee Lee. 2015. Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP. The Journal of Korean Institute of Communications and Information Sciences, 40, 3, (2015), 551-558. DOI: .

[KICS Style]

Rhong-Ho Jang, Jeon-Il Kang, Dae-Hun Nyang, Kyung-Hee Lee, "Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 3, pp. 551-558, 3. 2015.