Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety authentication method and system for wireless network

A security authentication, wireless network technology, applied in the field of wireless network security authentication based on steady-state signal fingerprint, communication signal processing and wireless network security, can solve the problems of communication equipment security authentication, inapplicability, etc., to prevent security hazards and concealment The effect of high sexuality and management safety

Inactive Publication Date: 2011-01-26
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when direct digital frequency synthesizers (DDS) are widely used in the manufacture of communication equipment, the carrier frequency stability of the same type of wireless equipment is getting higher and higher, the above characteristics are difficult to identify multiple communication equipment of the same type. safety certificate
[0005] Therefore, it is not applicable to use the existing transient signal characteristics or spectrum characteristics to establish a network security certification system at the hardware level. It is necessary to use the steady-state communication signals transmitted by communication equipment during normal operation, and use modern communication signal characteristic analysis methods to establish A set of steady-state signal fingerprint extraction methods that can reflect the hardware attributes of communication transmitters and have wider practical value, and establish a wireless network security certification system based on steady-state signal fingerprint keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method and system for wireless network
  • Safety authentication method and system for wireless network
  • Safety authentication method and system for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Below in conjunction with accompanying drawing and example the present invention is described in further detail.

[0041] Such as figure 1 Shown, the processing step of the inventive method is:

[0042] (1) The signal fingerprint device of the network access point monitors the steady-state communication signal transmitted by the individual communication device, and first extracts its conventional characteristics, including carrier frequency, code rate and other individual characteristics that contain the attributes of the wireless device.

[0043] Conventional signal characteristics are the technical basis of the present invention, that is, a part of the steady-state signal fingerprint, which refers to a regular change trend that is repeatedly shown in the signal transmitted by the same communication device during normal communication. The change rule information of the communication signal has the technical characteristics that reflect the individual characteristics ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety authentication method and a safety authentication system for a wireless network. The system comprises a signal fingerprint monitoring and processing module and a wireless network access authentication module at an access point. The method comprises the following steps that: at a network access point, the signal fingerprint monitoring and processing module performsdown-conversion and digitized sampling on a detected steady-state communication signal and extracts the conventional signal characteristic and the spurious signal characteristic of the steady-state signal by a communication signal processing method; after a higher-dimension spurious signal characteristic is reduced and optimized, the conventional signal characteristic and the spurious characteristic are fused into a steady-state signal fingerprint; and a signal fingerprint matching and safety authentication module matches the monitored steady-state fingerprint of unknown communication equipment and provides a corresponding safety strategy service according to a recognition result by a network authentication protocol. The method and the system are used for performing safety authentication on wireless communication equipment and enhancing the safety of a wireless communication network in combination with a software authentication system and have the characteristics of high concealment, high stability and safe management.

Description

technical field [0001] The invention belongs to the technical field of communication signal processing and wireless network security, in particular to the technical field of wireless network security authentication based on steady-state signal fingerprints. Background technique [0002] In recent years, all kinds of wireless communication networks represented by WLAN are developing rapidly beyond imagination because of their advantages of high efficiency, fast and flexible networking. With the rapid popularization, the corresponding wireless network security issues are increasingly prominent. Open channels and some forms of ad hoc networking have led to various security threats, and wireless network equipment cannot provide better security protection due to software system and hardware limitations, especially in some high-risk and sensitive industries (such as military, financial, medical and In industrial control, etc.), wireless networks are facing serious security threa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08
Inventor 徐书华徐争光莫益军黄本雄邹宁
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products