Personally, I think you are overly concerned about this attack. To be able to do a vlan hopping attack the attacker would have to unplug the access point and then plug their machine into that same port. They would then need to craft a double tagged packet.
If the attacker has physical access to be able to plug something in then they have a wide scope of potential attacks.
Personally, I would stick with the untagged management VLAN, and then just restrict the VLANs that are allowed on the switch port to only those required. Then even if someone did this, they could not get to any other VLANs than the ones you have specified.