Abstract
Results of an analysis of the mechanisms for protecting Wi-Fi networks have been presented. A Wi-Fi access point authentication method that can be used in various purpose networks has been proposed.
Similar content being viewed by others
References
Software CommView for Wi-Fi, 2015. http://www.tamos.ru/products/commview/.
Software Aircrack-ng, 2015. http://www.aircrack-ng.org/.
Authentication Types for Wireless Devices, 2008. http://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034623.
802.1X: Port-based network access control, 2010. http://standards.ieee.org/getieee802/download/802.1X-2010.pdf.
Cisco Rogue Management, 2013. http://www.cisco.com/c/en/us/td/docs/wireless/technology/roguedetection_ deploy/Rogue_Detection.html.
Software Waidps. https://github.com/SYWorks/waidps.git.
Software EvilAP_Defender. https://github.com/moha99sa/EvilAP_Defender/wiki.
Software HTTPS Everywhere. http://www.eff.org/https-everywhere.
Public key cryptography, 2011. http://www.intuit.ru/studies/courses/28/28/lecture/20422.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © D.P. Zegzhda, D.A. Moskvin, A.D. Dakhnovich, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Zegzhda, D.P., Moskvin, D.A. & Dakhnovich, A.D. Protection of Wi-Fi network users against rogue access points. Aut. Control Comp. Sci. 51, 978–984 (2017). https://doi.org/10.3103/S0146411617080302
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080302