A method of detecting a rogue access point is disclosed. A message is directed from a supplicant to a network through a first access point. A response message is received by the supplicant from the first access point. The supplicant can determine the first access point is a rogue access point based on whether the response message from the first access point is in nonconformity with a predetermined expectation. After the access point is determined to be a rogue access point, it is reported to the network through a valid network access point, after the supplicant is authenticated to the network.