RMIT University
Browse

Detecting IEEE 802.11 Client Device Impersonation on a Wireless Access Point

journal contribution
posted on 2024-11-02, 23:08 authored by Paul Zanna, Dinesh KumarDinesh Kumar, Peter Radcliffe
The ability to effortlessly construct and broadcast false messages makes IEEE 802.11 wireless networks particularly vulnerable to attack. False frame generation allows rogue devices to impersonate an au-thorized user and issue commands that impact the user’s network connection or possibly the entire network’s security. Unfortunately, the current device impersonation detection methods are unsuitable for small devices or real-time applications. Our contribution is to demonstrate that a rule-based learning classifier using several random forest (RF) features from an IEEE 802.11 frame can de-termine the probability that an impersonating device has generated that frame in real time. Our main innovation is a processing pipeline, and the algorithm that implements concurrent one-class classifiers on a per device basis yet is lightweight enough to run directly on a wireless access point (WAP) and produce real-time outputs.

History

Journal

Journal of Communications and Information Networks

Volume

7

Issue

4

Start page

408

End page

420

Total pages

13

Publisher

Posts and Telecom Press Co Ltd

Place published

Beijing, China

Language

English

Copyright

© 2022, Posts and Telecom Press Co Ltd. All rights reserved.

Former Identifier

2006120683

Esploro creation date

2023-04-08

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC