Kannan, Subarmaniam
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Emerging Science Journal

Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP) Arisandi, Diki; Ahmad, Nazrul M.; Kannan, Subarmaniam
Emerging Science Journal Vol 9, No 1 (2025): February
Publisher : Ital Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28991/ESJ-2025-09-01-016

Abstract

Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. To address this issue, this research has proposed an innovative mechanism called Invisible Scout, which uses a multi-module system to identify RAPs. This study aimed to develop and validate a mechanism capable of accurately detecting RAPs in controlled setups, real-world environments, and under de-authentication attack scenarios. The proposed system consists of four key modules: sniffer, detection, probing, and comparison. To evaluate its effectiveness, tests were conducted in controlled and open environments and under de-authentication scenarios, using decision tree models and various metrics to assess performance. The decision tree model showed promising results in the controlled setup, achieving an Area Under the Curve (AUC) score of 0.921 and classification accuracy (CA) of 0.875, indicating that the model effectively distinguished between legitimate access points and RAPs. When tested in an open environment, the model's performance improved, achieving an AUC score of 0.952 and a CA of 0.994. Furthermore, under a de-authentication attack, the model achieved an AUC score of 0.955 and a CA of 0.996. To gain a deeper understanding of RAP behaviors, linear regression analysis was conducted, revealing patterns and visualizing the existence of RAPs, which could assist in further analysis. In conclusion, the results demonstrated that the proposed mechanism was highly effective in identifying RAPs. Future research should focus on refining the detection mechanism, incorporating real-time response capabilities, and expanding testing to diverse network scenarios. Doi: 10.28991/ESJ-2025-09-01-016 Full Text: PDF
Assessing the Impact of Ghost Car Attacks on Traffic Flow in Vehicular Ad Hoc Networks Drahman, Isyraf Nazmi; Yogarayan, Sumendra; Abdul Razak, Siti Fatimah; Sayeed, Md. Shohel; Abdullah, Mohd. Fikri Azli; Kannan, Subarmaniam; Azman, Afizan
Emerging Science Journal Vol. 10 No. 1 (2026): February
Publisher : Ital Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28991/ESJ-2026-010-01-024

Abstract

Vehicular Ad Hoc Networks (VANETs) play a crucial role in enhancing road safety, traffic management, and driving efficiency through real-time communication between vehicles and infrastructure. However, VANETs are vulnerable to various security threats, one of which is the “ghost car” attack. In this attack, a malicious entity injects false information into the network, simulating the presence of a non-existent or “ghost” vehicle. This can lead to severe consequences such as traffic disruptions, accidents, and a compromised trust in the system’s reliability. This study aims to simulate and analyze the impacts of ghost car attacks on Vehicular Ad Hoc Networks (VANETs), focusing specifically on intersection waiting times and overall traffic flow. We used Simulation of Urban Mobility (SUMO) integrated with ns-3 for realistic VANET simulations, introducing varying numbers of ghost vehicles. Results indicate significant increases in waiting times and vehicle counts at intersections due to ghost cars, leading to traffic disruptions. This study evaluates ghost car attacks within realistic urban scenarios and proposes targeted detection and mitigation strategies, leveraging authentication, machine learning, and blockchain technologies.