A wireless terminal authentication method, wireless router and system

A wireless router and wireless terminal technology, applied in the transmission system, wireless communication, digital transmission system, etc., can solve the problems of being easily forged, reducing the security of the wireless local area network, and the security of the wireless terminal authentication process is not high, so as to reduce the risk of forgery Possibility, effect of improving safety

Inactive Publication Date: 2017-09-19
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the prior art, before querying the MAC address of the wireless terminal under test, the wireless terminal under test needs to provide a login password, and the login password can be intercepted by others through methods such as social engineering and counterfeit routers, so that the wireless terminal authentication process The security of the wireless LAN is not high, which reduces the security of the wireless local area network. In order to obtain the MAC address of the legal wireless terminal, in addition to the normal channels, you can also use the ARP (ARP, Address Resolution Protocol, Address Resolution Protocol) protocol to the legal The wireless terminal initiates an inquiry to intercept. Since the response to the ARP query occurs automatically, any wireless terminal compatible with the 802.11 standard can obtain the MAC address of the legal wireless terminal, which also makes the security of the wireless terminal authentication process not high. This reduces the security of the wireless LAN. In addition, the MAC address of the wireless terminal is easy to be forged. Since the MAC address is included in the link layer frame, and the link layer frame can be easily modified by the upper layer network program, others are passing through After a simple ARP query detects the MAC address of a legal wireless terminal, it can further modify its local MAC address to a legal wireless terminal MAC address, which leads to low security of the wireless terminal authentication process and reduces the security of the wireless LAN sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless terminal authentication method, wireless router and system
  • A wireless terminal authentication method, wireless router and system
  • A wireless terminal authentication method, wireless router and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0123]In the wireless terminal authentication method disclosed in Embodiment 1, after the wireless router receives the time stamp response data packet returned by the wireless terminal under test, it will sample and group all the finally obtained time stamp data packets, thereby reducing the authentication process. In addition, before calculating the clock drift value, the wireless router will perform offset deletion processing on the initial timestamp difference, which improves the accuracy and stability of the subsequent clock drift value to be calculated.

[0124] In order to further simplify the authentication process of the wireless terminal, the process of the wireless router judging whether the wireless terminal under test satisfies the authentication condition in the first embodiment is optimized below to obtain the second and third embodiments.

Embodiment 2

[0125] In Embodiment 2, the process of the wireless router judging whether the tested wireless terminal satisfies the authentication conditions is as follows:

[0126] The wireless router separately calculates the median of the similarity of each column in the similarity matrix, and judges whether the maximum value of the above median is greater than or equal to the threshold of the median, if yes, the wireless terminal under test passes the authentication, if not, then The wireless terminal under test fails to authenticate.

[0127] The preferred median threshold is 68.26%.

[0128] In the similarity matrix shown in Table 1, the median of the similarity between the first column and the third column is approximately equal to 0, the median of the similarity of the fourth column is 94.263%, and the median of the similarity of the fifth column is 5.7569%, so the maximum value of the above-mentioned median is 94.263%, which is greater than 68.26%, so it is determined that the tes...

Embodiment 3

[0130] In the third embodiment, the process of the wireless router judging whether the wireless terminal under test satisfies the authentication conditions is as follows:

[0131] The wireless router separately calculates the average value of the similarity of each column in the similarity matrix, and judges whether the maximum value of the above average value is greater than or equal to the average threshold value. If yes, the tested wireless terminal has passed the authentication; if not, the tested wireless terminal Terminal authentication failed.

[0132] The preferred mean threshold is 68.26%.

[0133] In the similarity matrix shown in Table 1, the average value of the similarity from the first column to the third column is approximately equal to 0, the average value of the similarity in the fourth column is 85.32%, and the average value of the similarity in the fifth column is 7.77% , so the maximum value of the above average value is 85.32%, which is greater than 68.26...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless terminal authentication method, a wireless router and a system. The system comprises the following steps: by using the wireless router, receiving an authentication request transmitted by a measured wireless terminal, and acquiring an IP (Internet Protocol) address; transmitting a timestamp request packet to the measured wireless terminal, and receiving a returned timestamp reply data packet; determining a timestamp difference value; calculating a clock drift value by utilizing a curve-fitting algorithm according to the timestamp difference value; calculating the similarity between the clock drift value and a clock drift reference value of each legal wireless terminal which is registered in the wireless router; judging whether the measured wireless terminal meets an authentication condition according to the similarity. According to the method disclosed by the embodiment of the invention, authentication information is obtained according to the clock drift value of the wireless terminal; the clock drift values of the wireless terminals have difference, so that the authentication information also has distinct uniqueness; therefore, the probability that the authentication information is faked is reduced; the security of an authentication process of the wireless terminal is improved.

Description

technical field [0001] The invention relates to the technical field of wireless local area networks, in particular to a wireless terminal authentication method, a wireless router and a system. Background technique [0002] With the continuous development of social economy and science and technology, wireless terminals have been more widely used, which greatly facilitates people's daily work and life. [0003] Wireless local area network is one of the main channels to realize Internet access, and improving the security of wireless local area network is an important mission of wireless local area network technology. In order to improve the security of the wireless local area network, the wireless router needs to authenticate the wireless terminal. [0004] In the prior art, in order to realize the authentication of the wireless terminal by the wireless router, an important way is to bind the MAC (MAC, Media Access Control, Media Access Control) address of the wireless termina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L1/16H04W12/06
CPCH04L1/1607H04L63/0876H04L67/08H04W12/06
Inventor 鲁力王润喆毛武斌陈伟丁菁
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products