Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,885 papers from all fields of science
Search
Sign In
Create Free Account
Rogue access point
A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Evil twin (wireless networks)
Man-in-the-middle attack
Piggybacking (Internet access)
Vulnerability scanner
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Rogue Access Point Localization Leveraging Compressive Sensing via Kernel Optimization
Q. Pu
,
J. Ng
,
Shijie Deng
,
Fawen Zhang
IEEE Wireless Communications and Networking…
2020
Corpus ID: 219990012
With the pervasive infrastructures of WLAN, user’s privacy has emerged as an important security and privacy problem. Rogue Access…
Expand
2019
2019
A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices
J. O. Agyemang
,
J. J. Kponyo
,
G. S. Klogo
Information Security and Computer Fraud
2019
Corpus ID: 88487922
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence…
Expand
2017
2017
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n
Rhongho Jang
,
Jeonil Kang
,
Aziz Mohaisen
,
Daehun Nyang
IEEE International Conference on Distributed…
2017
Corpus ID: 4771907
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP…
Expand
2017
2017
Rogue access point detection mechanism considering sequence number of beacon frame for wireless local area networks
Apisak Ketkhaw
,
S. Thipchaksurat
International Conference on Electrical…
2017
Corpus ID: 19324592
Rogue Access Point (RAP) is one of the serious problem concerned with the security issues. The attacker usually inserts the RAP…
Expand
2015
2015
Rogue Access Point Detection in Vehicular Environments
Hao Qu
,
Longjiang Guo
,
Weiping Zhang
,
Jinbao Li
,
Meirui Ren
Wireless Algorithms, Systems, and Applications
2015
Corpus ID: 42763152
The threat of rogue access points (APs) has attracted significant attentions from both industrial and academic researchers. This…
Expand
2011
2011
Heterogeneous wireless LAN-based wireless network attack analysis and research
Chengjun Xu
,
Hongxia Wang
International Conference on Uncertainty Reasoning…
2011
Corpus ID: 21954848
Wireless LAN is a heterogeneous wireless network, the main broadband access networks, has been widely used in people's daily life…
Expand
2010
2010
The Intrusion Detection System design in WLAN based on rogue AP
X. Peng
,
Cheng-kang Zhang
,
Diangang Wang
International Conference on Computer Engineering…
2010
Corpus ID: 14923456
Wireless IDS (Intrusion Detection System) can help network system quickly identify attacks, which extends the system…
Expand
2010
2010
Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN - a multi-agent sourcing Methodology
V. Sriram
,
Gadadhar Sahoo
,
K. Agrawal
IEEE International Advance Computing Conference
2010
Corpus ID: 16767312
Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time…
Expand
2008
2008
A Hidden Markov Model based approach to detect Rogue Access Points
Gayathri Shivaraj
,
Min Song
,
Sachin S. Shetty
IEEE Military Communications Conference
2008
Corpus ID: 5648334
One of the most challenging security concerns for network administrators is the presence of rogue access points. In this paper…
Expand
2007
2007
Cafe Cracks: Attacks on Unsecured Wireless Networks
P. Moceri
2007
Corpus ID: 18369994
Mobile users demand high connectivity in today's world, often at the price of security. Requiring Internet access at the airport…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE