Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN Based on Agents Terminology and Skew Intervals: A Proposal
Ahmed Ayad Abdalhameed
Ahmed Ayad Abdalhameed, Assistant Professor, College Of Medicine, University Of Baghdad, Iraq.
Manuscript received on March 22, 2013. | Revised Manuscript received on April 13, 2013. | Manuscript published on April 30, 2013. | PP: 804-807 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1582042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The existence of rough access points in the network is now days becoming very serious security threat for networks line WLAN. The presence of such network threats always resulted into the important information leakage or damage. Previously already many tools are developed by different research groups, however they are coming with some limitations which we have to discuss and address in this research proposal. Here the agent based approach is present not only to detect the rough access points but also their elimination from the wireless networks efficiently and with minimum cost involvement. The master agent and slave agents are generated automatically, which are acts as major components for providing the security to wireless networks. These agents are continuously doing the process of networks scanning to capture the rough access points and eliminate them. This scanning is scheduled based on clock skews which are playing important role. This Methodology has the following outstanding properties: (1) it doesn’t require any specialized hardware; (2) the proposed algorithm detects and completely eliminates the UAPs from network; (3) it provides a cost-effective solution; (4) due to multiple master agents possibility of network congestion or delays is reduced. The proposed technique can block UAPs as well as remove them from the networks both in form of Unauthorized APs.
Keywords: Fake Access Points, clock skews, master, slave, wireless networks.