<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.634104</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Automated Fake Access Point Attack Detection and Prevention System with IoT Devices</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8090-4998</contrib-id>
                                                                <name>
                                    <surname>Kılınçer</surname>
                                    <given-names>İlhan Fırat</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2306-6008</contrib-id>
                                                                <name>
                                    <surname>Ertam</surname>
                                    <given-names>Fatih</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2306-6008</contrib-id>
                                                                <name>
                                    <surname>Şengür</surname>
                                    <given-names>Abdülkadir</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20200131">
                    <day>01</day>
                    <month>31</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>1</issue>
                                        <fpage>50</fpage>
                                        <lpage>56</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20191016">
                        <day>10</day>
                        <month>16</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20191113">
                        <day>11</day>
                        <month>13</month>
                        <year>2019</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Wireless access points (APs), which allowmany devices to be easily connected to the Internet, are widely used todaybecause they offer the easiest way to connect to the Internet. With thedevelopment of the concept of Internet of Things (IoT), WiFi networks arewidely used in our homes, workplaces, social areas, campus areas. With theincrease of WiFi networks, attacks on these networks are constantly increasing.In this study, an IoT-based approach to detect and prevent Fake Access pointattacks frequently seen in WiFi networks is proposed. A Single Board Computer(SBC) and a wireless antenna in the &quot;Soft AP&quot; feature are used foroperation. Fake APs were detected by air scanning. In the first phase of thestudy, fake Access point broadcasts have been created which can create securityweakness. In order to determine the fake Access points created in the secondstage, SBC and wifi module were used to scan air. In the final stage, the macaddress of the fake AP has been assigned to an unauthorized Virtual Local AreaNetwork (vLAN) on the network to prevent detected fake AP broadcasts. Thepossible attack methods for the study were implemented and it was revealed thatthe proposed approach prevented the attack successfully in all scenarios. Thestudy is seen as an effective, developed and economically useful IoTapplication for network administrators to prevent the attack using fake Accesspoint.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Attack detection</kwd>
                                                    <kwd>  Attack prevention</kwd>
                                                    <kwd>  Network security</kwd>
                                                    <kwd>  Wireless access point security</kwd>
                                                    <kwd>  Internet security</kwd>
                                                    <kwd>  IoT</kwd>
                                            </kwd-group>
                            
                                                                                                                                                <funding-group specific-use="FundRef">
                    <award-group>
                                                    <funding-source>
                                <named-content content-type="funder_name">Fırat Üniversitesi</named-content>
                            </funding-source>
                                                                            <award-id>TEKF.18.13.</award-id>
                                            </award-group>
                </funding-group>
                                </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	C. Xu, W. Jin, X. Wang, G. Zhao, and S. Yu, “MC-VAP: A multi-connection virtual access point for high performance software-defined wireless networks,” J. Netw. Comput. Appl., vol. 122, pp. 88–98, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	D. Liu, B. Barber, and L. DiGrande, Cisco CCNA/CCENT exam 640-802, 640-822, 640-816 preparation kit. 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	V. Kumkar, A. Tiwari, P. Tiwari, A. Gupta, and S. Shrawne, “Vulnerabilities of Wireless Security protocols (WEP and WPA2),” Int. J. Adv. Res. Comput. Eng. Technol., vol. 1, no. 2, pp. 2278–1323, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	H. R. Hassan and Y. Challal, “Enhanced WEP: an efficient solution to WEP threats,” 2005, pp. 594–599.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	R. Heartfield et al., “A taxonomy of cyber-physical threats and impact in the smart home,” Computers and Security. 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	S. Wong, “The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards,” … . sans. org/rr/whitepapers/wireless/1109. php Retrieved, pp. 1–10, 2003.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	S. Vibhuti, “IEEE 802.11 WEP Wired Equivalent Privacy Concepts and Vulnerability,” San Jose State Univ., no. Iv, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	A. H. Lashkari, R. S. Hosseini, and F. Towhidi, “Wired equivalent privacy (WEP),” in Proceedings - 2009 International Conference on Future Computer and Communication, ICFCC 2009, 2009, pp. 492–495.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Y. Liu, Z. Jin, and Y. Wang, “Survey on security scheme and attacking methods of WPA/WPA2,” 2010 6th Int. Conf. Wirel. Commun. Netw. Mob. Comput. WiCOM 2010, pp. 1–4, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	A. H. Adnan et al., “A comparative study of WLAN security protocols: WPA, WPA2,” in Proceedings of 2015 3rd International Conference on Advances in Electrical Engineering, ICAEE 2015, 2016, pp. 165–169.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	J. Z. Liu Yong-lei, “Distributed method for cracking WPA/WPA2-PSK on multi-coreCPU and GPU architecture,” no. November 2013, pp. 723–742, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	S. Gold, “Cracking wireless networks,” Netw. Secur., vol. 2011, no. 11, pp. 14–18, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	Y. Wang, Z. Jin, and X. Zhao, “Practical defense against WEP and WPA-PSK attack for WLAN,” in 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	K. Bicakci and B. Tavli, “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks,” Computer Standards and Interfaces, vol. 31, no. 5. pp. 931–941, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	J. Bellardo and S. Savage, “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.,” in USENIX security, 2003, pp. 15–28.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	X. Zha and M. Ma, “Security improvements of IEEE 802.11i 4-way handshake scheme,” in 12th IEEE International Conference on Communication Systems 2010, ICCS 2010, 2010, pp. 667–671.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	Z. Bai and Y. Bai, “4-Way handshake solutions to avoid denial of service attack in ultra wideband networks,” in 3rd International Symposium on Intelligent Information Technology Application, IITA 2009, 2009, vol. 3, pp. 232–235.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	S. H. Eum, Y. H. Kim, and H. K. Choi, “A Secure 4‐Way Handshake in 802.11i Using Cookies.pdf,” vol. 2, no. 1, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	A. Alabdulatif, X. Ma, and L. Nolle, “Analysing and attacking the 4-way handshake of IEEE 802.11i standard,” in 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, 2013, pp. 382–387.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	Internet, “4 Way Handshake.” .</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	T. D. Nguyen, D. H. M. Nguyen, B. N. Tran, H. Vu, and N. Mittal, “A lightweight solution for defending against deauthentication/ disassociation attacks on 802.11 networks,” Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, pp. 185–190, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	K. El-Khatib, “Impact of feature reduction on the efficiency of wireless intrusion detection systems,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 8, pp. 1143–1149, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	K. F. Kao, W. C. Chen, J. C. Chang, and H. Te Chu, “An accurate fake access point detection method based on deviation of beacon time interval,” in Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014, 2014, pp. 1–2.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	M. K. Chirumamilla and B. Ramamurthy, “Agent based intrusion detection and response system for wireless LANs,” 2004, pp. 492–496.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	S. Nikbakhsh, A. B. A. Manaf, M. Zamani, and M. Janbeglou, “A novel approach for rogue access point detection on the client-side,” in Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, 2012, pp. 684–687.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
