Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points

Authors

  • Dr. Kashyap C. Patel Department of Computer Science, Ganpat University, Mehsana, Gujarat, India Author
  • Dr. Sachin A. Goswami Department of Computer Science, Ganpat University, Mehsana, Gujarat, India Author
  • Dr. Saurabh A. Dave Ganpat University, Mehsana, Gujarat, India Author
  • Ajaykumar Patel A.M.Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, India Author

DOI:

https://doi.org/10.32628/CSEIT241036

Keywords:

Vehicular Rogue Access Point, Vehicular Network, Network Disruption

Abstract

Vehicular Networks have transformed modern transportation by facilitating communication between vehicles (V2V) and between vehicles and infrastructure (V2I). Nevertheless, this technical progress brings forth new security risks, including Vehicular Rogue Access Points (VRAPs), which have the potential to disrupt network connectivity and jeopardize the integrity of vehicular networks. This research investigates the menace presented by VRAPs, analyzing their capacity to cause significant disruptions to computer networks. We conduct a thorough analysis to emphasize the methods by which VRAPs can be utilized, the many types of assaults they can enable, and the subsequent consequences for the security of vehicular networks. The results of our research highlight the immediate requirement for strong security measures to protect vehicular network from these types of risks.

Downloads

Download data is not yet available.

References

K. C. Patel and A. Patel, "Rogue Access Point: The WLAN Threat," 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India, 2022, pp. 943-950, doi: 10.1109/ICCCIS56430.2022.10037591. keywords: {Wireless networks;Weapons;Hazards;Electric vehicle charging;Communication system security;Automobiles;Servers;Rogue Access Point;WLAN Threat;DDoS;802.11}, DOI: https://doi.org/10.1109/ICCCIS56430.2022.10037591

K. C. Patel and A. Patel, "Taxonomy and Future Threat of Rogue Access Point for Wireless Network," 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2022, pp. 679-688, doi: 10.23919/INDIACom54597.2022.9763150. keywords: {Wireless sensor networks;Wireless networks;Weapons;Scalability;Wires;Taxonomy;Communication system security;Rogue Access Point;WLAN;Wireless;802.11;Distributed Denial of Service;Security;Threat}, DOI: https://doi.org/10.23919/INDIACom54597.2022.9763150

Recognition of rogue access points using a ..., https://ijcrt.org/papers/IJCRT2212283.pdf (accessed Jun. 21, 2024).

P. K. Chaitanyakumar, “An experimental study and novel approach for detection and suppression of rogue access point in Wlan,” Shodhganga@INFLIBNET: An Experimental Study and Novel Approach for Detection and Suppression of Rogue Access Point in Wlan, http://hdl.handle.net/10603/459897 (accessed Jun. 21, 2024).

R. Coppola and M. Morisio, "Connected car: technologies, issues, future trends," ACM Computing Surveys (CSUR), vol. 49, no. 3, pp. 1-36, 2016. DOI: https://doi.org/10.1145/2971482

H. Han, F. Xu, C. C. Tan, Y. Zhang and Q. Li, "VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet," in IEEE Transactions on Vehicular Technology, vol. 63, no. 8, pp. 3927-3934, Oct. 2014, doi: 10.1109/TVT.2014.2311015. keywords: {Global Positioning System;Internet;Roads;Wireless communication;Sensitivity;OFDM;Vehicles;Drive-thru Internet;IEEE 802.11 wireless networks;rogue access points (APs)}, DOI: https://doi.org/10.1109/TVT.2014.2311015

H. Han, F. Xu, C. C. Tan, Y. Zhang and Q. Li, "Defending against vehicular rogue APs," 2011 Proceedings IEEE INFOCOM, Shanghai, China, 2011, pp. 1665-1673, doi: 10.1109/INFCOM.2011.5934960. DOI: https://doi.org/10.1109/INFCOM.2011.5934960

Q. Pu, J. K. -Y. Ng, M. Zhou and J. Wang, "A Joint Rogue Access Point Localization and Outlier Detection Scheme Leveraging Sparse Recovery Technique," in IEEE Transactions on Vehicular Technology, vol. 70, no. 2, pp. 1866-1877, Feb. 2021, doi: 10.1109/TVT.2021.3055263. DOI: https://doi.org/10.1109/TVT.2021.3055263

keywords: {Location awareness;Monitoring;Kernel;Clustering methods;Anomaly detection;Wireless sensor networks;Privacy;Wireless LAN;Rogue Access Point localization;sparse recovery;clustering;outlier detection},

P. Zhao, K. Bian, P. Chen, T. Zhao, Y. Duan and W. Yan, "Trident: Context-Based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks," 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 2016, pp. 1-5, doi: 10.1109/VTCFall.2016.7881590. keywords: {Wireless fidelity;Authentication;Logic gates;Servers;Feature extraction;Hardware;Context}, DOI: https://doi.org/10.1109/VTCFall.2016.7881590

H. Qu, L. Guo, W. Zhang, J. Li, and M. Ren, "Rogue access point detection in vehicular environments," in Wireless Algorithms, Systems, and Applications: 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings 10, Springer International Publishing, 2015, pp. 446-456. DOI: https://doi.org/10.1007/978-3-319-21837-3_44

B. Al-Otaibi, N. Al-Nabhan, and Y. Tian, "Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing," Sensors, vol. 19, no. 4, p. 965, 2019. [Online]. Available: https://doi.org/10.3390/s19040965 DOI: https://doi.org/10.3390/s19040965

S. B. Vanjale and P. B. Mane, "Multi parameter based robust and efficient rogue AP detection approach," Wireless Personal Communications, vol. 98, pp. 139-156, 2018. DOI: https://doi.org/10.1007/s11277-017-4860-5

S. A. Goswami and K. D. Patel, "Network Security for IoT Device using Blockchain Technology," 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023, pp. 1-8, doi: 10.1109/ICCCNT56998.2023.10308186. keywords: {Logistic regression;Machine learning;Network security;Multilayer perceptrons;Blockchains;Complexity theory;Internet of Things;IoT;network security;blockchain technology;Base64 encoding;SHA-256 hashing;filtering techniques}, DOI: https://doi.org/10.1109/ICCCNT56998.2023.10308186

X. Lu, X. Wan, L. Xiao, Y. Tang and W. Zhuang, "Learning-Based Rogue Edge Detection in VANETs with Ambient Radio Signals," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018, pp. 1-6, doi: 10.1109/ICC.2018.8422831. keywords: {Image edge detection;Mobile handsets;Authentication;Vehicular ad hoc networks;Wireless networks;Received signal strength indicator;Learning (artificial intelligence)}, DOI: https://doi.org/10.1109/ICC.2018.8422831

K. K. Yadav and S. Tapaswi, "Vehicular Rogue Access Point Detection Using Speed of Vehicle," Wireless Personal Communications, vol. 82, pp. 849-860, 2015. DOI: https://doi.org/10.1007/s11277-014-2256-3

C. Wang, X. Zheng, Y. Chen and J. Yang, "Locating Rogue Access Point Using Fine-Grained Channel Information," in IEEE Transactions on Mobile Computing, vol. 16, no. 9, pp. 2560-2573, 1 Sept. 2017, doi: 10.1109/TMC.2016.2629473. DOI: https://doi.org/10.1109/TMC.2016.2629473

keywords: {Wireless communication;IEEE 802.11 Standard;Communication system security;Mobile computing;Hardware;Estimation;Security;Rogue access point;channel state information;localization;direction determination},

Z. Yang, Q. Lu, H. Zhang, F. Chen and H. Xian, "Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification," in IEEE Internet of Things Journal, vol. 11, no. 8, pp. 14886-14900, 15 April15, 2024, doi: 10.1109/JIOT.2023.3345378. DOI: https://doi.org/10.1109/JIOT.2023.3345378

keywords: {Fingerprint recognition;Internet of Things;Hardware;Clocks;Behavioral sciences;Wireless fidelity;Object recognition;Channel state information (CSI);deep learning;Internet of Things (IoT) security;physical-layer identification;Rogue access point (AP) detection;Wi-Fi security},

H. Peng, Le Liang, X. Shen and G. Y. Li, "Vehicular Communications: A Network Layer Perspective," in IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1064-1078, Feb. 2019, doi: 10.1109/TVT.2018.2833427. DOI: https://doi.org/10.1109/TVT.2018.2833427

N. H. Hussein, C. T. Yaw, S. P. Koh, S. K. Tiong and K. H. Chong, "A Comprehensive Survey on Vehicular Networking: Communications, Applications, Challenges, and Upcoming Research Directions," in IEEE Access, vol. 10, pp. 86127-86180, 2022, doi: 10.1109/ACCESS.2022.3198656. DOI: https://doi.org/10.1109/ACCESS.2022.3198656

keywords: {Vehicular ad hoc networks;Ad hoc networks;Wireless sensor networks;Communication system security;Reliability;Vehicle safety;Routing;VANET;vehicular communication;safety-related;security;routing;V2V;V2I;V2X},

keywords: {Safety;Vehicles;Roads;Reliability;Automation;Wireless communication;Vehicular communications;manually driven vehicles;autonomous vehicles;routing protocols;handoff strategies;communication technologies},

A. M. Vegni, M. Biagi, and R. Cusani, "Smart vehicles, technologies and main applications in vehicular ad hoc networks," in Vehicular Technologies-Deployment and Applications, 2013, pp. 3-20.

“Penetration testing and ethical hacking linux distribution,” Kali Linux, https://www.kali.org/ (accessed Jun. 20, 2024).

Alfa Network Inc.. ALFA Network Inc. (n.d.). https://www.alfa.com.tw/

“Welcome to Python.org,” Python.org, https://www.python.org/ (accessed Jun. 20, 2024).

Downloads

Published

24-06-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 122

You may also start an advanced similarity search for this article.