Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information

被引:0
|
作者
Zheng, Xiuyuan [1 ]
Wang, Chen [1 ]
Chen, Yingying [1 ]
Yang, Jie [2 ]
机构
[1] Stevens Inst Technol, Dept ECE, Hoboken, NJ 07030 USA
[2] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rogue access point (AP) has emerged as an important security problem in WLANs. However, it is a challenge task to localize the rogue AP with both high accuracy and minimal infrastructure cost. Either expensive professional infrastructure (e.g., multiple wireless sniffers) or additional hardware (e.g., directional antenna) need to be pre-deployed for rogue AP localization with high cost. Moreover, existing methods using Received Signal Strength (RSS) result in large error as RSS is suffered from the multipath and shadowing effects in complex wireless environment. In this work, we exploit the channel state information (CSI), which is readily available from commercial Wi-Fi devices, to locate the rogue AP with high accuracy. We use only a single off-the-shelf Wi-Fi device for rogue AP localization which involves minimal infrastructure requirement. Our proposed rogue AP localization framework consists of two components: direction determination and position estimation. By characterizing time domain CSI amplitude, we develop direction determination approach to estimate the direction of the rogue AP at the Wi-Fi device. We further propose two schemes to estimate position of the rogue AP: directions determined at multiple locations grounded on triangulation, or walking towards the rogue AP with direction adjustment. Results from extensive experiments in both indoor and outdoor environments show that our framework can achieve more practical and accurate rogue AP localization when comparing with existing RSS-based approach.
引用
收藏
页码:211 / 219
页数:9
相关论文
共 50 条
  • [31] Manageable Fine-Grained Information Flow
    Efstathopoulos, Petros
    Kohler, Eddie
    EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, 2008, : 301 - 313
  • [32] A Joint Rogue Access Point Localization and Outlier Detection Scheme Leveraging Sparse Recovery Technique
    Pu, Qiaolin
    Ng, Joseph Kee-Yin
    Zhou, Mu
    Wang, Jie
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1866 - 1877
  • [33] Detecting information leakage in updating XML documents of fine-grained access control
    Chatvichienchai, Somchai
    Iwaihara, Mizuho
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 286 - 296
  • [34] Towards Fine-Grained Localization of Privacy Behaviors
    Jain, Vijayanta
    Ghanavati, Sepideh
    Peddinti, Sai Teja
    McMillan, Collin
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 258 - 277
  • [35] Fine-Grained UHF RFID Localization for Robotics
    Jin, Meng
    Yao, Shun
    Li, Kexin
    Tian, Xiaohua
    Wang, Xinbing
    Zhou, Chenghu
    Cao, Xinde
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (06) : 5247 - 5262
  • [36] Towards a fine-grained access control for Cloud
    Msahli, Mounira
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 286 - 291
  • [37] Delegatable access control for fine-grained XML
    Wu, J
    Seberry, J
    Mu, Y
    Ruan, C
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 270 - 274
  • [38] Fine-grained integration of access control policies
    Rao, Prathima
    Lin, Dan
    Bertino, Elisa
    Li, Ninghui
    Lobo, Jorge
    COMPUTERS & SECURITY, 2011, 30 (2-3) : 91 - 107
  • [39] Fine-grained Access Control to Web Databases
    Roichman, Alex
    Gudes, Ehud
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 31 - 40
  • [40] A Fine-Grained Image Access Control Model
    Al Bouna, Bechara
    Chbeir, Richard
    Gabillon, Alban
    Capolsini, Patrick
    8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 603 - 612