Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: https://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2019, 7(1), 7-12
DOI: 10.12691/iscf-7-1-2
Open AccessArticle

A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices

Justice Owusu Agyemang1, Jerry John Kponyo1, and Griffith Selorm Klogo1

1Faculty of Electrical/Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

Pub. Date: January 19, 2019

Cite this paper:
Justice Owusu Agyemang, Jerry John Kponyo and Griffith Selorm Klogo. A Lightweight Rogue Access Point Detection Algorithm for Embedded Internet of Things (IoT) Devices. Information Security and Computer Fraud. 2019; 7(1):7-12. doi: 10.12691/iscf-7-1-2

Abstract

The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet for the purpose of exchanging information. The direct connection of IoT devices to the internet makes them susceptible to several security threats. Researchers have developed techniques aimed at enhancing security of IoT devices at both network and application layers. In this paper, we present a real-time and lightweight algorithm, based on information theoretic approach, that enables rogue access point detection for embedded IoT devices. This is to ensure that WiFi-enabled IoT devices can intelligently distinguish between legitimate and rogue access points. We evaluated the performance of the algorithm with respect to the detection rate and also CPU utilization efficiency.

Keywords:
IoT MITM IDS DoS AP

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  IoT Analytics. (2014). “Why the Internet of Things Is Called Internet of Things: Definition, History, Disambiguation”, [Online]. Available: https://iot-analytics.com/Internet-of-things-definition/.
 
[2]  Miorandi D., Sicari S., De Pellegrini F., Chalmatac I., “Internet of Things: vision, applications and research challenges”, Ad Hoc Network 10(7), 1497-1516, 2012.
 
[3]  Borgia, E., “The Internet of Things vision: key features, applications and open issues”, Comput. Commun. 54, 1-31, 2014.
 
[4]  Garcia-Morchon O., Kumar S., Struik R., Keoh S., Hummen R., “Security considerations in the IP-based Internet of Things”, IETF Internet-Draft, 2013.
 
[5]  Sicari S., Rizzardi A., Grieco L., Coen-Porisini A., “Security, privacy and trust in Internet of Things: the road ahead”, Comput. Netw. 76 (0), 146-164, 2015.
 
[6]  Notra S., Siddiqi M., Gharakheili H., Sivaraman V., Boreli R., “An experimental study of security and privacy risks with emerging household appliances”, Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 79-84, 2014.
 
[7]  Kolias, C., Stavrou, A., Voas, J., Bojanova, I., Kuhn, R., “Learning Internet-of-things security ‘Hands-on’”. IEEE Secur. Priv. 20 (February), 2-11.
 
[8]  Ibrahim Halil Saruhan, “Detecting and Preventing Rogue Devices on the Network”, SANS Institute, pp. 5-7 2007.
 
[9]  S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav, “Detecting\& Eliminating Rogue Access Point in IEEE 802.11 WLAN”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) Volume-1, Issue-1, 2011.
 
[10]  T. Kim, H. Park, H. Jung, H. Lee, “Online detection of fake access points using received signal strengths”, 2012.
 
[11]  Mehndi Samra, Mehak Mengi, Sparsh Sharma, Naveen Kumar Gondhi, “Detection and Mitigation of Rogue Access Point”, Journal of Scientific and Technical Advancements, Volume 1, Issue 3, pp. 195-198, 2015.
 
[12]  Bruno Bogaz Zarpelao, Rodrigo Sanches Miani, Caludio Toshio Kawakani, Sean Carlisto de Alvarenga, “A Survey of Intrusion Detection in Internet of Things”, Journal of Network and Computer Applications, pp. 2-4, 2017.
 
[13]  Ettercap, http://ettercap.github.io/ettercap/, [Accessed Dec 11, 2018].
 
[14]  Wireshark, http://www.wireshark.org/, [Accessed Dec 11, 2018].
 
[15]  Snort, http://www.snort.org/, [Accessed Dec 11, 2018].
 
[16]  Iwlist, https://linux.die.net/man/8/iwlist, [Accessed Dec 11, 2018].
 
[17]  RaspberryPi, https://www.raspberrypi.org/products/raspberry-pi-3-model-b/, [Accessed Dec 11, 2018].
 
[18]  Tenda Wireless Driver, https://github.com/Mange/rtl8192eu-linux-driver/, [Accessed Dec 11, 2018].
 
[19]  Iwlist Parser, https://github.com/jayluxferro/iwlist-parser, [Accessed Dec 11, 2018].
 
[20]  IoT-IDS, https://github.com/jayluxferro/IoT-IDS/.