Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

A mobile device-based mobile AP detection scheme using NAT behavior

Full metadata record
DC Field Value Language
dc.contributor.authorKim, M.-
dc.contributor.authorMun, J.-
dc.contributor.authorJung, S.-
dc.contributor.authorKim, Y.-
dc.date.available2019-04-10T10:34:50Z-
dc.date.created2018-04-17-
dc.date.issued2013-
dc.identifier.isbn9781479928453-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32919-
dc.description.abstractThis paper proposes the scheme to detect the Mobile AP from mobile devices independently without the help of additional nodes. The proposed scheme is for detecting the Mobile AP that does not have any security configuration which is highly likely to occur as the Rogue AP in real wireless network environment. The device inspects the NAT Behavior and Open Port at the time of specific AP connection to detect the presence of Mobile AP, and reduces the security threat for the Rogue AP. The Rogue AP detection scheme s presented previously are generally based on the detection of Rogue AP in the form of Evil Twin, and the Rogue AP of various forms cannot be detected easily with such techniques. In addition, such techniques require regular monitoring or additional network infrastructure, thus making it difficult to apply to mobile devices, and are not suitable in real public wireless network environment. The proposed technique enables detection of mobile AP, which does not have any security configuration, from mobile devices in public wireless network environment independently without the help of additional nodes, and therefore, represents the detection scheme that is easily applicable and proved its performance in the experiment under real wireless network environment. © 2013 IEEE.-
dc.relation.isPartOf2013 International Conference on IT Convergence and Security, ICITCS 2013-
dc.titleA mobile device-based mobile AP detection scheme using NAT behavior-
dc.typeConference-
dc.identifier.doi10.1109/ICITCS.2013.6717778-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation2013 3rd International Conference on IT Convergence and Security, ICITCS 2013-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-84894143836-
dc.citation.conferenceDate2013-12-16-
dc.citation.conferencePlaceMacau-
dc.citation.title2013 3rd International Conference on IT Convergence and Security, ICITCS 2013-
dc.contributor.affiliatedAuthorJung, S.-
dc.contributor.affiliatedAuthorKim, Y.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > ETC > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Sou hwan photo

Jung, Sou hwan
College of Information Technology (Department of IT Convergence)
Read more

Altmetrics

Total Views & Downloads

BROWSE