Skip to main content
Log in

Protection of Wi-Fi network users against rogue access points

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Results of an analysis of the mechanisms for protecting Wi-Fi networks have been presented. A Wi-Fi access point authentication method that can be used in various purpose networks has been proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Software CommView for Wi-Fi, 2015. http://www.tamos.ru/products/commview/.

  2. Software Aircrack-ng, 2015. http://www.aircrack-ng.org/.

  3. Authentication Types for Wireless Devices, 2008. http://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034623.

  4. 802.1X: Port-based network access control, 2010. http://standards.ieee.org/getieee802/download/802.1X-2010.pdf.

  5. Cisco Rogue Management, 2013. http://www.cisco.com/c/en/us/td/docs/wireless/technology/roguedetection_ deploy/Rogue_Detection.html.

  6. Software Waidps. https://github.com/SYWorks/waidps.git.

  7. Software EvilAP_Defender. https://github.com/moha99sa/EvilAP_Defender/wiki.

  8. Software HTTPS Everywhere. http://www.eff.org/https-everywhere.

  9. Public key cryptography, 2011. http://www.intuit.ru/studies/courses/28/28/lecture/20422.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. P. Zegzhda.

Additional information

Original Russian Text © D.P. Zegzhda, D.A. Moskvin, A.D. Dakhnovich, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, D.P., Moskvin, D.A. & Dakhnovich, A.D. Protection of Wi-Fi network users against rogue access points. Aut. Control Comp. Sci. 51, 978–984 (2017). https://doi.org/10.3103/S0146411617080302

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080302

Keywords

Navigation