Keywords

1 Introduction

The wireless local area network (WLAN) communication is a rapidly growing approach for data sharing. A wireless network provides network access to mobile devices. Benefits of WLAN are like flexibility, mobility, portability, imposes performance, and security requirements. Such communication brings new network security threats. Physical security of wireless networks is impossible because wireless network signals are unidirectional and can proceed out of intended coverage area. Intruder with an apt wireless receiver can snoop into the network still remaining virtually undetected [1].

In a WLAN, the most important security apprehension is the presence of RAPs. These RAPs are which can be definitely used by persons with inadequate security knowledge. Most of the security threats require an advanced technical knowledge or expensive intrusion devices [2]. A RAP is a wireless AP, which is installed in a secure wireless network without network administrator permission. Such RAP allows intruder to do a man in the middle (MITM) attack. Existence of such RAP causes security threats in WLAN [3].

The access point is very popular because of features like mobility, scalability, cost effectiveness, and ease of installation. Airtight [4] report shows that lack of knowledge about secure wireless network causes number of security threats. On the basis of Gartner research, we can say that 20 % of WLAN worldwide have unapproved access points. Intruder can use an AP with a high broadcast power to cover-up as a authentic AP [5]. Mobile agents were used for RAP detection but it has the limitation that client permission is required to run code [6].

2 Related Works

  1. i.

    Jana and Kasara proposed a server side solution using clock skews of access point in a wireless network. In this approach, clock skews are used as a fingerprint to detect RAP in a network. Clock skews are calculated using the time stamp values from the beacon frames. This approach cannot detect MAC spoofing and has a lack of accuracy and speed in the calculation of clock skews in TCP/ICMP [7].

  2. ii.

    S. Nikbakhsh et al. proposed client side approach for the detection of MITM attack and Evil Twin attack performed by RAP. It checks routes and the gateways through which packet travels as well as easily can be implemented without modifying a network. It is easy to implement on mobile devices. But attacker can easily break the security by using sniffing programs [8].

  3. iii.

    Chao Yang et al. proposed to exploit fundamental communication structures and properties of evil twin attacks in wireless networks and to design new active, statistical, and anomaly detection algorithms. Their preliminary evaluation in real-world widely deployed 802.11b and 802.11g wireless networks shows very promising results. It can identify evil twins with a very high detection rate while maintaining a very low false positive rate [9].

  4. iv.

    Kim et al. proposed a client side approach using the concept of received signal strength (RSS) for RAP detection. In this method, highly correlated RSS sequences are collected in the wireless devices. After that the received signal is normalized and classified whether the collected signal is multiple or not. For this, a sequential hypothesis technique is used. It is a lightweight solution to overcome the drawbacks of the client side approach. But in this technique, the distance between the client node and access points while calculating the signal strength was never considered. Distance affects the signal strength, hence reducing the effectiveness of this approach [10].

  5. v.

    Han et al. proposed a timing-based scheme to detect RAP. It uses a client side approach, where the emphasis is on round trip time between the server and the user, to check whether the access point is authorized AP or not. The detection algorithm is effective and accurate, but only wireless traffic between AP and the station is considered to set the RAP. Large overhead due to the trade-off between the overhead and accuracy [11].

  6. vi.

    Kao et al. proposed a client side RAP detection technique using bottleneck bandwidth analysis. It uses a passive packet analysis approach. It is based on bandwidth estimation using packet pair technology [12].

3 Limitations of Existing Methods

Following limitations were found in the existing methods by reviewing the above referred papers:

  1. i.

    Clock Skew Solution: It is assumed that first, the authorized AP will be activated and then the malicious AP. But this assumption is weak, as one cannot control which AP will be activated first.

  2. ii.

    Inter Packet Arrival Time: Can be used to detect RAPs, but it is not effective in case when Evil Twin is present [13].

  3. iii.

    Mobile Agent Code: Mobile agent code is small, which is installed on a mobile device for the purpose of detecting RAP. But a mobile agent code cannot be installed without client permission, which results into a major drawback of this method [14, 15].

  4. iv.

    MAC Address & SSID: SSID and MAC address is used to detect RAP. These properties can be spoofed by using many tools available on internet.

  5. v.

    RSS Level: RSS of the access point is used by various methods to detect RAPs. But variations in RSS levels cause variation in results [16].

  6. vi.

    Wireless Traffic: In wireless environment, network traffic can provide inaccurate results. Such inaccurate results create a suitable environment for RAP to perform attacks [17].

  7. vii.

    Workload of Access Point: The effectiveness of detection of RAP is affected by the workload at the access point.

  8. viii.

    Server Side Approach: The major drawback with the server side approach is that, if the central server is not available or compromised, then the system will not work properly. If client node is out of the reachability of a server then server cannot provide service to client. The server side approach is expensive, limited and cannot work for many real life scenarios [18].

Above vulnerabilities are observed in the existing methods, using which intruders perform various attacks on WLAN. These vulnerabilities can be eliminated by using multiple parameters for RAP detection.

4 Rogue Access Point Detection Parameters

4.1 SSID

SSID is a short form used for Service Set Identifier. SSID consist of 32 characters. In one network there can be multiple SSID’s. There can be multiple access points having the same SSID in single network. Without SSID’s it is difficult to communicate and interact with one another.

4.2 MAC Address

MAC address is a short form used for media access control. MAC address is used for communicated in between physical network segment and MAC address is assigned to network interfaces. It is a unique identifier.

4.3 RSSI

RSSI is known for received signal strength indicator. The quality of communication between the sensor unit and the access point is indicated by the RSSI value and it is expressed as decibels (dB). The RSSI values are always negative number because of low power levels and attenuation of free air. RSSI values can vary from 0 to −100. The value near to 0 signifies strong signal, whereas the value approaching −100 indicates weaker signal [19].

4.4 Channel and Frequency

Wireless channels are used to convey information signals from one network to another network. Channels can transmit the information signals from senders to receivers. The transmitting capacity of the channel is measured in bandwidth in Hz or its data rate in bits per second.

Wireless network consist of 13 channels which are unlicensed. Each channel has its own unique frequency from 2412 to 2484 MHz with difference of 5 MHz.

4.5 Authentication Type

User in any network wants security of its data being transferred from one source to destination. Transmission protocols and policies are known as authentication. Authentication types are given below:

4.5.1 WEP

WEP is a short from of wired equivalent policy. WEP is an older method of security used in case of older devices and it is easy to hack. So it is not used widely.

4.5.2 WPA

WPA is a term used in short form for Wi-Fi protected access. WPA provides guaranty to the user that only authorized people should have access to it. WPA is sub divided in two parts first one is WPA 1 and other is WPA 2.

4.5.3 WPA 2-PSK

PSK is term used for pre-shared key. This is the latest protocol used today for Wi-Fi security.

4.5.4 802.1X Authentication

It enhances security for 802.11 wireless network. It provides network access with validity [19].

4.6 Radio Type

IEEE has prepared different standards for wireless network with a suffix letter and it covers every standard including security aspects and quality service, e.g., 802.11a/b/g/n/ac.

5 System Architecture

In this system, Wi-Fi scanner scans all access points in the network. Access points in the network broadcast beacon frames after specific time. Capture beacon frame from each access point. From each beacon frame SSID, MAC address, Channel and frequency, RSSI of access point is extracted. This captured information is stored in whitelist.

Administrative login compares new AP parameter details with whitelist AP parameter values and sort authorized AP, unauthorized AP and Rogue AP in wireless network. Access point is scanned periodically and checks properties of access point from whitelist. We have used different parameters like SSID, MAC Address, Authentication type, Channel, Frequency, and Power (RSSI) for detection of RAP.

If SSID is same then check MAC address. If MAC address is also same then check authentication type. If authentication type is same then check channel & frequency of access point. If anyone parameter from all parameters is mismatch with whitelist content then declare that access point as rouge access point (Fig. 1).

Fig. 1
figure 1

Architecture of system

6 Results

Wi-Fi scanner captures the beacon frame. Following parameters values are extracted from the captured beacon frame (Table 1).

Table 1 List of all authorized and unauthorized access points present in network

After giving authorization to access points, the result shows as they are authorized or unauthorized. If APs parameter value is changed by attacker then it becomes rogue access point (Tables 2, 3 and 4).

Table 2 Rogue access point detection due to variation in RSSI
Table 3 Rogue access point detection using MAC address
Table 4 Rogue access point detection due to variation in RSSI

7 Conclusion

In this implemented solution, rogue access point is detected using various parameters. To detect RAP we have used various parameters like SSID, MAC address, RSSI value, channels and frequency, authentication, radio type, etc. It also detects MAC address and SSID spoofing attack with less false positive and false negative rates.