ORIGINAL RESEARCH article

Front. Comput. Sci.

Sec. Computer Security

WiMapper: A Lightweight Kernel-Based Framework for Rogue Access Point Detection on Edge Devices

  • Vellore Institute of Technology - Chennai Campus, Chennai, India

The final, formatted version of the article will be published soon.

Abstract

Abstract—Public wireless networks have evolved from convenient services into critical urban infrastructure, yet they remain fundamentally susceptible to identity-based exploits. The Evil Twin attack persists as a significant threat because client devices implicitly trust broadcast identifiers before a secure encryption channel is established. Existing defense mechanisms typically rely on either cost-prohibitive Wireless Intrusion Prevention Systems (WIPS), which necessitate centralized wired infrastructure, or computationally intensive deep learning models that exceed the resource capabilities of edge sensors. This paper presents WiMapper, a detection framework engineered specifically for Resource-Constrained Edge Devices (RCEDs). The architecture employs a two-stage hybrid approach: Track A utilizes a deterministic whitelist for immediate threat filtering, while Track B deploys a One-Class Support Vector Machine (OC-SVM) with a Radial Basis Function (RBF) kernel to assess signal integrity. By analyzing higher-order statistical features, specifically Kurtosis and Skewness, the model identifies non-Gaussian anomalies characteristic of signal spoofing. Extensive simulations using the HCXY dataset and subsequent field validation demonstrated that WiMapper achieves a Pareto-optimal balance between efficiency and accuracy. The framework attained a mean F1-Score of 0.740 with an algorithmic inference latency of 0.15 ms and a memory footprint of 188.5 KB. These metrics confirm that the kernel-based approach offers a superior trade-off between sensitivity and computational cost compared to Isolation Forest and Autoencoder baselines, positioning it as a highly efficient solution for dense, low-power security sensor networks.

Summary

Keywords

Edge computing, IoT security, Network Security, One-class SVM, Rogue access points, RSSI analysis, Wireless Sensor Networks

Received

05 December 2025

Accepted

19 February 2026

Copyright

© 2026 A, Krithick, K, G, Devadoss, Sacheev Krishanu and Ranganathan. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Kumaran K

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Share article

Article metrics