{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:40:27Z","timestamp":1759092027258},"reference-count":22,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2018,10,1]]},"DOI":"10.1587\/transinf.2018edp7030","type":"journal-article","created":{"date-parts":[[2018,9,30]],"date-time":"2018-09-30T22:09:50Z","timestamp":1538345390000},"page":"2465-2473","source":"Crossref","is-referenced-by-count":7,"title":["Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames"],"prefix":"10.1587","volume":"E101.D","author":[{"given":"Qian","family":"LU","sequence":"first","affiliation":[{"name":"Dept. of Computer Science and Technology, Ocean University of China"}]},{"given":"Haipeng","family":"QU","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Technology, Ocean University of China"}]},{"given":"Yuan","family":"ZHUANG","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Technology, Ocean University of China"}]},{"given":"Xi-Jun","family":"LIN","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Technology, Ocean University of China"}]},{"given":"Yuzhan","family":"OUYANG","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Technology, Ocean University of China"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] N. Agrawal and S. Tapaswi, \u201cWireless rogue access point detection using shadow honeynet,\u201d Wireless Personal Communications, vol.83, no.1, pp.551-570, 2015. 10.1007\/s11277-015-2408-0","DOI":"10.1007\/s11277-015-2408-0"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] B. Alotaibi and K. Elleithy, \u201cRogue access point detection: Taxonomy, challenges, and future directions,\u201d Wireless Personal Communications, vol.90, pp.1261-1290, 2016. 10.1007\/s11277-016-3390-x","DOI":"10.1007\/s11277-016-3390-x"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N.T. Nguyen, G. Zheng, Z. Han, and R. Zheng, \u201cDevice fingerprinting to enhance wireless security using nonparametric Bayesian method,\u201d INFOCOM 2011, pp.1404-1412, 2011. 10.1109\/infcom.2011.5934926","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, \u201cWireless device identification with radiometric signatures,\u201d ACM International Conference on Mobile Computing and Networking, pp.116-127, 2008. 10.1145\/1409944.1409959","DOI":"10.1145\/1409944.1409959"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, \u201cEnhancing the security of corporate Wi-Fi networks using DAIR,\u201d International Conference on Mobile Systems, Applications, and Services, pp.1-14, 2006. 10.1145\/1134680.1134682","DOI":"10.1145\/1134680.1134682"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] S. Shetty, M. Song, and L. Ma, \u201cRogue access point detection by analyzing network traffic characteristics,\u201d Military Communications Conference, Milcom 2017, pp.1-7, 2007. 10.1109\/milcom.2007.4455018","DOI":"10.1109\/MILCOM.2007.4455018"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] H. Yin, G. Chen, and J. Wang, \u201cDetecting protected layer-3 rogue APs,\u201d International Conference on Broadband Communications, Networks and Systems, 2007, Broadnets, pp.449-458, 2007. 10.1109\/broadnets.2007.4550468","DOI":"10.1109\/BROADNETS.2007.4550468"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] W. Wei, S. Jaiswal, J. Kurose, and D. Towsley, \u201cIdentifying 802.11 traffic from passive measurements using iterative Bayesian inference,\u201d INFOCOM 2006, IEEE International Conference on Computer Communications, pp.1-12, 2006. 10.1109\/infocom.2006.291","DOI":"10.1109\/INFOCOM.2006.291"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, \u201cPassive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs,\u201d ACM SIGCOMM Conference on Internet Measurement 2007, San Diego, California, USA, pp.365-378, Oct. 2007. 10.1145\/1298306.1298357","DOI":"10.1145\/1298306.1298357"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] H. Han, B. Sheng, C.C. Tan, Q. Li, and S. Lu, \u201cA timing-based scheme for rogue AP detection,\u201d IEEE Trans. Parallel Distrib. Syst., vol.22, no.11, pp.1912-1925, 2011. 10.1109\/tpds.2011.125","DOI":"10.1109\/TPDS.2011.125"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] C.D. Mano, A. Blaich, Q. Liao, Y. Jiang, D.A. Cieslak, D.C. Salyers, and A. Striegel, \u201cRipps: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning,\u201d ACM Trans. Information &amp; System Security, vol.11, no.2, Article No.2, 2008. 10.1145\/1330332.1330334","DOI":"10.1145\/1330332.1330334"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Song, C. Yang, and G. Gu, \u201cWho is peeping at your passwords at starbucks? \u2014 To catch an evil twin access point,\u201d IEEE\/IFIP International Conference on Dependable Systems &amp; networks, pp.323-332, 2010. 10.1109\/dsn.2010.5544302","DOI":"10.1109\/DSN.2010.5544302"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] S. Jana and S.K. Kasera, \u201cOn fast and accurate detection of unauthorized wireless access points using clock skews,\u201d IEEE Trans. Mobile Comput., vol.9, no.3, pp.449-462, 2010. 10.1109\/tmc.2009.145","DOI":"10.1109\/TMC.2009.145"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] F. Lanze, A. Panchenko, B. Braatz, and T. Engel, \u201cLetting the puss in boots sweat: Detecting fake access points using dependency of clock skews on temperature,\u201d ACM Symposium on Information, Computer and Communications Security, pp.3-14, 2014. 10.1145\/2590296.2590333","DOI":"10.1145\/2590296.2590333"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] A. Kumar and P. Paul, \u201cSecurity analysis and implementation of a simple method for prevention and detection against evil twin attack in IEEE 802.11 wireless LAN,\u201d International Conference on Computational Techniques in Information and Communication Technologies, pp.176-181, 2016. 10.1109\/icctict.2016.7514574","DOI":"10.1109\/ICCTICT.2016.7514574"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Q. Lu, H. Qu, Y. Zhuang, X.-J. Lin, Y. Zhu, and Y. Liu, \u201cA passive client-based approach to detect evil twin attacks,\u201d 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp.233-239, 2017. 10.1109\/trustcom\/bigdatase\/icess.2017.242","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.242"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] W. Wei, B. Wang, C. Zhang, and J. Kurose, \u201cClassification of access network types: Ethernet wireless LAN, ADSL, cable modem or dialup?,\u201d INFOCOM 2005, Joint Conference of the IEEE Computer and Communications Societies, vol.2, pp.1060-1071, 2005. 10.1109\/infcom.2005.1498334","DOI":"10.1109\/INFCOM.2005.1498334"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] F.-H. Hsu, C.-S. Wang, Y.-L. Hsu, Y.-P. Cheng, and Y.-H. Hsneh, \u201cA client-side detection mechanism for evil twins,\u201d Computers &amp; Electrical Engineering, vol.59, pp.76-85, 2017. 10.1016\/j.compeleceng.2015.10.010","DOI":"10.1016\/j.compeleceng.2015.10.010"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz, \u201cOn the reliability of wireless fingerprinting using clock skews,\u201d ACM Conference on Wireless Network Security, pp.169-174, 2010. 10.1145\/1741866.1741894","DOI":"10.1145\/1741866.1741894"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] F. Lanze, A. Panchenko, I. Ponce-Alcaide, and T. Engel, \u201cUndesired relatives: Protection mechanisms against the evil twin attack in IEEE 802.11,\u201d ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp.87-94, 2014. 10.1145\/2642687.2642691","DOI":"10.1145\/2642687.2642691"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, \u201cActive behavioral fingerprinting of wireless devices,\u201d ACM Conference on Wireless Network Security, WiSec&apos;08, Alexandria, VA, USA, pp.56-61, 2008. 10.1145\/1352533.1352543","DOI":"10.1145\/1352533.1352543"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] F. Lanze, A. Panchenko, I. Ponce-Alcaide, and T. Engel, \u201cHacker&apos;s toolbox: Detecting software-based 802.11 evil twin access points,\u201d 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp.225-232, 2015. 10.1109\/ccnc.2015.7157981","DOI":"10.1109\/CCNC.2015.7157981"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/10\/E101.D_2018EDP7030\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T03:54:09Z","timestamp":1571975649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/10\/E101.D_2018EDP7030\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":22,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2018edp7030","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}