Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network

A denial of service attack and wireless network technology, applied in the field of network security, can solve problems such as the inability to guarantee the verification result of the puzzle, and achieve the effects of improving the ability to resist DoS attacks, increasing difficulty, and ensuring diversity and randomness

Inactive Publication Date: 2011-09-21
XIDIAN UNIV
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method has a better anti-DoS attack capability, but because the solutions used to verify the puzzle answer in the scheme are already connected users, and there may be malicious users among these connected users who reply the wrong puzzle verification message, so this method There is no guarantee that the puzzle verification result is credible, and there are security flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network
  • Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network
  • Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] refer to image 3 , the specific implementation steps of the method for resisting the denial of service attack of the wireless network based on solving the quadratic congruence equation proposed by the present invention are as follows:

[0033] In step 1, the key management center of the wireless network system generates a global public parameter n and a function Rand(z).

[0034] The global public parameter n is the product of two random prime numbers larger than 512 bits and is regularly updated by the key management center. The function Rand(z) is a uniform pseudo-random number generation function whose output value is in the interval [1, w], w is The bit length of n, z is the input seed of the function Rand(z).

[0035] Step 2, the access point AP periodically broadcasts to the wireless local area network a beacon frame adding question puzzle construction parameters.

[0036] The access point AP adds the parameters z, L, R, and D used to construct the puzzle in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quadratic congruence equation-based method for resisting denial-of-service attacks of a wireless network, which belongs to the technical field of network safety, and mainly solves the problem that the DoS (Denial-of-Service) attacks exist in a wireless access authentication process of an IEEE (Institute of Electrical and Electronic Engineers) 802.11i protocol. The method is implemented by the following steps: an AP (Access Point) adds parameters used for constructing a puzzle into a beacon frame and broadcasts the beacon frame periodically by using the beacon frame in the IEEE 802.11i protocol; a client STA (Special Temporary Authority) acquires the beacon frame, extracts puzzle parameters from the beacon frame, constructs and solves the puzzle in combination with the current global parameters of the wireless network, adds the puzzle parameters and the solution into an authentication request message, and sends an authentication request message to the AP; and the AP receives an open system authentication message of the STA, and the AP sends the authentication request message to the STA to complete the association process when the solution of the puzzle is correct, or the request of the STA is terminated. When the method is adopted, the negotiation times increased to construct the puzzle in a traditional client puzzle scheme are reduced, and the negotiation efficiency and the DoS attach resistance of the wireless access authentication protocol are improved.

Description

technical field [0001] The invention belongs to the technical field of network security and relates to a method for resisting wireless network denial of service attacks, which can be used to reduce the influence of denial of service attacks on the wireless network access authentication process. technical background [0002] Denial of service DoS attack has become the first major problem in network security due to its characteristics of easy implementation, difficulty in tracking, and serious consequences. Its main purpose is to make the services provided in the network lose their availability. In a wireless network, due to the limitations of wireless network equipment performance and bandwidth resources, it is more vulnerable than wired networks in terms of anti-attack capabilities, and is more vulnerable to DoS attacks and more serious damage. [0003] As a key device for sending and receiving data in a wireless LAN, the access point AP often becomes the security bottleneck...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W48/10H04W12/041H04W12/0431H04W12/126
Inventor 董庆宽李琳李小平刘彦明黎剑兵
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products