{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:35:52Z","timestamp":1769556952821,"version":"3.49.0"},"reference-count":27,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"National Key R&D Program of China","award":["2017YFB1003000"],"award-info":[{"award-number":["2017YFB1003000"]}]},{"name":"Jiangsu Provincial Scientific and Technological Achievements Transfer Fund","award":["BA2016052"],"award-info":[{"award-number":["BA2016052"]}]},{"name":"Jiangsu Provincial Natural Science Foundation of China","award":["BK20150628"],"award-info":[{"award-number":["BK20150628"]}]},{"name":"Jiangsu Provincial Natural Science Foundation of China","award":["BK20150637"],"award-info":[{"award-number":["BK20150637"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502100"],"award-info":[{"award-number":["61502100"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572130"],"award-info":[{"award-number":["61572130"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602111"],"award-info":[{"award-number":["61602111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632008"],"award-info":[{"award-number":["61632008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Computer Network and Information Integration of Ministry of Education of China","award":["93K-9"],"award-info":[{"award-number":["93K-9"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,8]]},"abstract":"<jats:p> Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia and industry. Utilizing received signal strength information is an effective solution to detect rogue access points. However, the received signal strength information is formed by multi-dimensional received signal strength vectors that are collected by multiple sniffers, and these received signal strength vectors are inevitably lacking in some dimensions due to the limited wireless transmission range and link instability. This will result in high false alarm rate for rogue access point detection. To solve this issue, we propose a received signal strength\u2013based practical rogue access point detection approach, considering missing received signal strength values in received signal strength vectors collected in practical environment. First, we present a preprocessing scheme for received signal strength vectors, eliminating missing values by means of data filling, filtering, and averaging. Then, we perform clustering analysis on the received signal strength vectors, where we design a distance measurement method that dynamically uses partial components in received signal strength vectors to minimize the distance deviation due to missing values. Finally, we conduct the experiments to evaluate the performance of the practical rogue access point detection. The results demonstrate that the practical rogue access point detection can significantly reduce the false alarm rate while ensuring a high detection rate. <\/jats:p>","DOI":"10.1177\/1550147718795838","type":"journal-article","created":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T09:16:43Z","timestamp":1535447803000},"page":"155014771879583","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":20,"title":["PRAPD: A novel received signal strength\u2013based approach for practical rogue access point detection"],"prefix":"10.1177","volume":"14","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-4437-0850","authenticated-orcid":false,"given":"Wenjia","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science & Engineering, Southeast University, Nanjing, China"}]},{"given":"Xiaolin","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Computer Science & Engineering, Southeast University, Nanjing, China"}]},{"given":"Kai","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science & Engineering, Southeast University, Nanjing, China"}]},{"given":"Xiaomin","family":"Shi","sequence":"additional","affiliation":[{"name":"China Information Consulting & Designing Institute Co. Ltd, Nanjing, China"}]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science & Engineering, Southeast University, Nanjing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,8,28]]},"reference":[{"key":"bibr1-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957139"},{"key":"bibr2-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.10.007"},{"key":"bibr3-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"bibr4-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"},{"key":"bibr5-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.75"},{"key":"bibr6-1550147718795838","first-page":"361","volume-title":"Proceedings of the conference on computer communications","author":"Sui K"},{"key":"bibr7-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"bibr8-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.12.009"},{"key":"bibr9-1550147718795838","first-page":"1","volume-title":"Proceedings of the global communications conference","author":"Gonzales H"},{"key":"bibr10-1550147718795838","first-page":"2271","volume-title":"Proceedings of the 47th annual global telecommunications conference","volume":"4","author":"Beyah RA"},{"key":"bibr11-1550147718795838","first-page":"365","volume-title":"Proceedings of the internet measurement conference","author":"Wei W"},{"key":"bibr12-1550147718795838","first-page":"1","volume-title":"Proceedings of the global communications conference","author":"Burns A"},{"key":"bibr13-1550147718795838","first-page":"104","volume-title":"Proceedings of the 14th annual international conference on mobile computing and networking","author":"Jana S"},{"key":"bibr14-1550147718795838","first-page":"3","volume-title":"Proceedings of the 9th symposium on information, computer and communications security","author":"Lanze F"},{"key":"bibr15-1550147718795838","first-page":"2515","volume-title":"Proceedings of the 37th international conference on distributed computing systems","author":"Jang R"},{"key":"bibr16-1550147718795838","first-page":"309","volume-title":"Proceedings of the 8th international workshop on recent advances in intrusion detection","author":"Guo F"},{"key":"bibr17-1550147718795838","first-page":"1768","volume-title":"Proceedings of the 27th conference on computer communications","author":"Sheng Y"},{"key":"bibr18-1550147718795838","volume-title":"Proceedings of the 4th annual communications society conference on sensor, mesh and ad hoc communications and networks","author":"Chen Y"},{"key":"bibr19-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"bibr20-1550147718795838","doi-asserted-by":"publisher","DOI":"10.3390\/s16030281"},{"key":"bibr21-1550147718795838","first-page":"2327","volume-title":"Proceedings of the 37th international conference on distributed computing systems","author":"Zhou T"},{"key":"bibr22-1550147718795838","first-page":"446","volume-title":"Proceedings of the international conference on wireless algorithms, systems, and applications","author":"Qu H"},{"key":"bibr25-1550147718795838","volume-title":"Proceedings of the 10th annual international conference on mobile computing and networking","author":"Adya A"},{"key":"bibr26-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"bibr27-1550147718795838","volume-title":"802.11 wireless networks: the definitive guide","author":"Gast MS.","year":"2005","edition":"2"},{"key":"bibr28-1550147718795838","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2789431"},{"key":"bibr29-1550147718795838","volume":"344","author":"Kaufman L","year":"2009","journal-title":"Finding groups in data: an introduction to cluster analysis"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718795838","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718795838","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718795838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T23:27:22Z","timestamp":1607470042000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/journals.sagepub.com\/doi\/10.1177\/1550147718795838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.1177\/1550147718795838"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1177\/1550147718795838","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}