[1]Kim M, Kwon S, Elmazi D, et al. A technical survey on methods for detecting rogue access points[C]// Proc of Int Conf on Innovative Mobile and Internet Services in Ubiquitous Computing. Berlin: Springer, 2019: 215-226
[2]Alotaibi B, Elleithy K. Rogue access point detection: Taxonomy, challenges, and future directions[J]. Wireless Personal Communications, 2016, 90(3): 1261-1290
[3]Github.Aircrack-ng[EB/OL].[2018-12-10].https://github.com/aircrack-ng/aircrack-ng
[4]Github.WiFi-Pumpkin[EB/OL].[2019-04-07].https://github.com/P0cL4bs/WiFi-Pumpkin
[5]Sriram V S S, Sahoo G, Agrawal K K. Detecting and eliminating rogue access points in IEEE-802.11 WLAN-a multi-agent sourcing methodology[C]//Proc of the 2nd Int Advance Computing Conf (IACC). Piscataway, NJ: IEEE, 2010: 256-260
[6]Nikbakhsh S, Manaf A B A, Zamani M, et al. A novel approach for rogue access point detection on the client-side[C]// Proc of the 26th Int Conf on Advanced Information Networking and Applications Workshops. Piscataway, NJ: IEEE, 2012: 684-687
[7]金双齐, 凌捷. 无线网络钓鱼 AP 攻击检测技术研究[J]. 计算机应用与软件, 2016, 33(10): 307-310
[8]冯鑫,胡勇.在智能家居环境下基于CSI的伪AP检测研究[J].信息安全研究, 2018, 4(2):163-169
[9]赵方圆. 基于EMD的射频指纹提取和识别算法研究[D].成都:电子科技大学,2019
[10]Jana S, Kasera S K. On fast and accurate detection of unauthorized wireless access points using clock skews[J]. IEEE Trans on Mobile Computing, 2009, 9(3): 449-462
[11]李雨珊.基于射频特征的接入认证研究[D].成都:电子科技大学,2019
[12]Hua J, Sun H, Shen Z, et al. Accurate and efficient wireless device fingerprinting using channel state information[C]//Proc of IEEE Conf on Computer Communications. Piscataway, NJ: IEEE, 2018: 1700-1708
[13]Adamsky F, Retunskaia T, Schiffner S, et al. WLAN device fingerprinting using channel state information (CSI)[C]//Proc of the 11th ACM Conf on Security & Privacy in Wireless and Mobile Networks. New York: ACM, 2018: 277-278
[14]Halperin D, Hu W, Sheth A, et al. Tool release: Gathering 802.11n traces with channel state information[J]. ACM SIGCOMM Computer Communication Review, 2011, 41(1): 53-53
[15] Bromley J , Guyon I , Lecun Y , et al. Signature verification using a siamese time delay neural network[C]//Proc of the 6th Int Conf on Neural Information Processing Systems. San Francisco, CA: Morgan Kaufmann, 1993: 737-744
|