These days, wireless networks have become an indispensable environment in our life. Wireless broadcasting APs (Access Points) are deployed all around and a user can easily connect to the public network anytime and anywhere. In this situation, an attacker can steal data from the connected user via wireless connection. Rogue AP (Rogue Access Point) is one of deodorization methods of attackers that solicitates users to connect to the rogue AP and intercept user data by setting up an AP with the same configuration of legitimate APs to make users not to distinguish it from the others installed in public places. In this way, if a user is connected to the Rogue AP, an attacker can cause critical problems by taking the user's data and exploiting it for payment, authentication, and etc. Several researchers have studied ways to detect and prevent rogue APs based on dependent information including SSID (Service Set Identifier) and MAC (Media Access Control) addresses. This paper surveys the trials and methods to mitigate the rogue APs problems. In the survey, the components that can be used are listed and analyzed, enabling them to serve as a cornerstone for further work and present a vision for future research.
展开▼