Introduction to IEEE 802.11 Rogue Access Point Detection Mechanism Using Covert Channel
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
The problem of providing protection to the user from a rogue access point is a big problem today. To protect against the rogue access point through existing mechanism is by using IEEE 802.1x. However, it is difficult to use and impossible to quest. So, we are proposing a mechanism that will allow the users to protect their terminals before connecting to the rogue access points. This project presents the concept of access point authentication in terminals using covert channel over Transport Layer of TCP/IP reference model and it uses the timestamp field of beacon frame. So, in this project we are showing that without breaching the original standard of the frame, we can embed non-standard information on the timestamp field of 802.11 beacon frame.
Authors and Affiliations
Prof. Kiran Somase, Akshay R. Shelke, Ankita S. Bhise, Rajat R. Balpande, Sagar D. Bhusari
Compare results of restoration of Motion Blurred Images using Non Blind Techniques
Image deblurring and restoration has been of great importance nowadays. Image recognition becomes difficult when it comes to blurred and poorly illuminated images and it is here image restoration come to picture. In thi...
IR Sensor Based Squats Detection of Railway Track using Robot
This paper proposes the design of crack finding robot for finding cracks in the railway tracks. Here the LPC2148 microcontroller is interfaced with Robot, Global Positioning System (GPS), Liquid Crystal Display (LCD) an...
Physicochemical Study of Ground Water of Shahdol City (Madhya Pradesh) With Special Reference to Status of WQI
Water is one of the most indispensable resources and known for the elixir of life. It is believed that groundwater must possess degree of purity free from chemical contamination and micro-organisms. Groundwater is the m...
slugAn Insight Into Concept ofCluster Analysis and Its Evaluation.
Cluster analysis is a method for identification of homogeneous groupsof objects (observations, cases or events) based on the information found in the data describing the objects or their relationships. Themain goal is t...
Unmanned surveillance and rescue operations using Smartphone controlled Robot
The main objective of this project is to stipulate a surveillance robot under a unmanned condition. The robot entitles an on board video camera which is adjustable with servo motors, battery backup and features wireless...