METHOD AND DEVICE FOR DETECTING A SPOOFING ATTACK IN A WIRELESS COMMUNICATION NETWORK
First Claim
1. A method for determining at a primary access point in a wireless communication network whether an alternative access point is conducting a spoofing attack, the method comprising:
- receiving at the primary access point a beacon signal transmitted from the alternative access point, wherein the beacon signal includes an alternative access point identification;
comparing at the primary access point the alternative access point identification with an actual identification of the primary access point; and
determining at the primary access point that the alternative access point is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and device enables detecting a spoofing attack in a wireless communication network (100). The method includes receiving at the primary access point (105) a beacon signal transmitted from an alternative access point (115), where the beacon signal includes an alternative access point identification. The primary access point (105) then compares the alternative access point identification with an actual identification of the primary access point (105). It is then determined at the primary access point that the alternative access point (115) is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point (105).
-
Citations
19 Claims
-
1. A method for determining at a primary access point in a wireless communication network whether an alternative access point is conducting a spoofing attack, the method comprising:
-
receiving at the primary access point a beacon signal transmitted from the alternative access point, wherein the beacon signal includes an alternative access point identification; comparing at the primary access point the alternative access point identification with an actual identification of the primary access point; and determining at the primary access point that the alternative access point is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A primary access point, comprising:
-
a processor; and a memory operatively coupled to the processor, wherein the memory comprises; computer readable program code components for receiving at the primary access point a beacon signal transmitted from an alternative access point, wherein the beacon signal includes an alternative access point identification; computer readable program code components for comparing at the primary access point the alternative access point identification with an actual identification of the primary access point; and computer readable program code components for determining at the primary access point that the alternative access point is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A primary access point, comprising:
-
means for receiving at the primary access point a beacon signal transmitted from an alternative access point, wherein the beacon signal includes an alternative access point identification; means for comparing at the primary access point the alternative access point identification with an actual identification of the primary access point; and means for determining at the primary access point that the alternative access point is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point.
-
Specification