基于粒子群优化的流氓接入点定位

F. Awad, Mohammad Al-Refai, Ahmad Al-qerem
{"title":"基于粒子群优化的流氓接入点定位","authors":"F. Awad, Mohammad Al-Refai, Ahmad Al-qerem","doi":"10.1109/IACS.2017.7921985","DOIUrl":null,"url":null,"abstract":"Determining the location of a rogue access point is an important research problem due to the security threats it imposes. Rogue access points can be used to carry out different types of attacks such as man-in-the-middle, denial of service, and building a private channel for information theft. The main contribution of this research is a novel efficient approach to locate a rogue access points using Particle Swarm Optimization. In this paper, the received signal strength is used to estimate the distance between the access point transmitter and number of known locations around it. The set of received signal strength samples, along with their corresponding known locations, is used as an input to a customized Particle Swarm Optimization algorithm. The algorithm searches for the optimal location of the access point that matches the given sample set. The proposed approach was evaluated via simulation and was shown to estimate the location of the rogue access point quickly and precisely in different practical scenarios. Comparative analysis demonstrated that the proposed approach can prominently outperform the state-of-the-art techniques.","PeriodicalId":180504,"journal":{"name":"2017 8th International Conference on Information and Communication Systems (ICICS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Rogue access point localization using particle swarm optimization\",\"authors\":\"F. Awad, Mohammad Al-Refai, Ahmad Al-qerem\",\"doi\":\"10.1109/IACS.2017.7921985\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Determining the location of a rogue access point is an important research problem due to the security threats it imposes. Rogue access points can be used to carry out different types of attacks such as man-in-the-middle, denial of service, and building a private channel for information theft. The main contribution of this research is a novel efficient approach to locate a rogue access points using Particle Swarm Optimization. In this paper, the received signal strength is used to estimate the distance between the access point transmitter and number of known locations around it. The set of received signal strength samples, along with their corresponding known locations, is used as an input to a customized Particle Swarm Optimization algorithm. The algorithm searches for the optimal location of the access point that matches the given sample set. The proposed approach was evaluated via simulation and was shown to estimate the location of the rogue access point quickly and precisely in different practical scenarios. Comparative analysis demonstrated that the proposed approach can prominently outperform the state-of-the-art techniques.\",\"PeriodicalId\":180504,\"journal\":{\"name\":\"2017 8th International Conference on Information and Communication Systems (ICICS)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th International Conference on Information and Communication Systems (ICICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IACS.2017.7921985\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th International Conference on Information and Communication Systems (ICICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACS.2017.7921985","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

由于恶意接入点所带来的安全威胁,确定其位置是一个重要的研究问题。流氓接入点可用于执行不同类型的攻击,例如中间人攻击、拒绝服务攻击和构建用于信息窃取的专用通道。本研究的主要贡献是利用粒子群算法提出了一种新的有效的恶意接入点定位方法。本文使用接收到的信号强度来估计接入点发射机与其周围已知位置的数量之间的距离。接收到的信号强度样本集,以及它们对应的已知位置,被用作定制粒子群优化算法的输入。该算法搜索与给定样本集匹配的接入点的最优位置。仿真结果表明,该方法能够在不同的实际场景中快速准确地估计出非法接入点的位置。对比分析表明,所提出的方法明显优于最先进的技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Rogue access point localization using particle swarm optimization
Determining the location of a rogue access point is an important research problem due to the security threats it imposes. Rogue access points can be used to carry out different types of attacks such as man-in-the-middle, denial of service, and building a private channel for information theft. The main contribution of this research is a novel efficient approach to locate a rogue access points using Particle Swarm Optimization. In this paper, the received signal strength is used to estimate the distance between the access point transmitter and number of known locations around it. The set of received signal strength samples, along with their corresponding known locations, is used as an input to a customized Particle Swarm Optimization algorithm. The algorithm searches for the optimal location of the access point that matches the given sample set. The proposed approach was evaluated via simulation and was shown to estimate the location of the rogue access point quickly and precisely in different practical scenarios. Comparative analysis demonstrated that the proposed approach can prominently outperform the state-of-the-art techniques.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Using behaviour-driven development with hardware-software co-design for autonomous load management Efficient 3D placement of a UAV using particle swarm optimization A brain friendly tool to facilitate research-teaching nexus: Mind maps HidroMORE 2: An optimized and parallel version of HidroMORE Comparative analysis of MCDM methods for product aspect ranking: TOPSIS and VIKOR
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1