RSS-based wireless spoofing attack positioning method

A technology of spoofing attack and positioning method, which is applied in the direction of location information-based services, wireless communication, radio wave measurement system, etc., and can solve problems such as inability to determine the physical location of the attacker, difficult to process RSS data, and multiple noises

Inactive Publication Date: 2016-05-04
GUANGDONG UNIV OF TECH
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current RSS-based WLAN security detection methods can only locate a single attacker. When multiple attackers use the same identity to cooperate with each other to launch a spoofing attack, none of these methods can determine the physical location of the attacker.
3. RSS is a physical property related to wireless signals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSS-based wireless spoofing attack positioning method
  • RSS-based wireless spoofing attack positioning method
  • RSS-based wireless spoofing attack positioning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The invention provides an RSS-based wireless spoofing attack positioning method, including:

[0066] S1. Establishing a location fingerprint database corresponding to the WLAN environment;

[0067] S2. Using the beacon to monitor the wireless data packets in the WLAN in real time, and then extract and obtain the RSS data stream of each node;

[0068] S3. Use the K-central point algorithm to select multiple K values, and cluster the RSS data streams of each node in turn according to each K value to obtain the corresponding clustering results, and finally obtain multiple clustering results for each node Class results; in the K-center point algorithm, the initial value of K is 2, and the value of K is increased by 1 each time it is clustered until it reaches the preset maximum value;

[0069] S4. After evaluating multiple clustering results obtained by each node, an optimal clustering result corresponding to each node is obtained;

[0070] S5. After sequentially obtainin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RSS-based wireless spoofing attack positioning method. The method comprises steps: a position fingerprint database corresponding to a WLAN (Wireless Local Area Network) environment is built; a beacon is adopted to monitor wireless data packets in the WLAN in real time, and an RSS data flow for each node is further acquired; a K-medoid algorithm is used for selecting multiple K values, and according to a corresponding clustering result after each K value carries out clustering on the RSS data flow for each node sequentially, multiple clustering results for each node can be acquired finally; after the acquired multiple clustering results for each node are evaluated, the optimal clustering result corresponding to each node is acquired; and after a representative object of multiple clusters in the optimal clustering result is acquired sequentially, the position fingerprint database is combined to calculate and acquire the position coordinates of an attacker, and a positioning result is outputted. One or more attackers can be positioned, the positioning accuracy is high, and the method of the invention can be widely applied to the wireless information safety field.

Description

technical field [0001] The invention relates to the field of wireless security research, in particular to an RSS-based wireless deception attack positioning method. Background technique [0002] Glossary: [0003] RSS: received signal strength; [0004] WLAN: WirelessLocalAreaNetworks, wireless local area network; [0005] ISM frequency band: IndustrialScientificMedicalBand, industrial, scientific and medical frequency band; [0006] ACL: access control list; [0007] AP: AccessPoint, access point, also called beacon in the present invention; [0008] RAP: Rogue Access Point; [0009] DoS: denial of service; [0010] MAC: Medium / MediaAccessControl, or MAC address, physical address, used to represent the identifier of each site on the Internet; [0011] SSID: ServiceSetIdentifier, service set identifier, SSID technology can divide a wireless local area network into several sub-networks that require different authentication. Each sub-network requires independent authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W4/02H04W64/00G01S11/06H04W12/122
CPCH04W4/025H04W12/12H04W64/00G01S11/06
Inventor 柳毅凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products