Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs

Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall

2013

Abstract

The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge.

Download


Paper Citation


in Harvard Style

Milliken J., Selis V., Meng Yap K. and Marshall A. (2013). Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 488-493. DOI: 10.5220/0004506404880493

in Bibtex Style

@conference{secrypt13,
author={Jonny Milliken and Valerio Selis and Kian Meng Yap and Alan Marshall},
title={Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={488-493},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004506404880493},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs
SN - 978-989-8565-73-0
AU - Milliken J.
AU - Selis V.
AU - Meng Yap K.
AU - Marshall A.
PY - 2013
SP - 488
EP - 493
DO - 10.5220/0004506404880493