Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Location method of wireless spoofing attack based on rss

A technology of spoofing attack and positioning method, which is applied in the directions of location-based services, wireless communications, radio wave measurement systems, etc. It can solve the problems of high noise, difficult to process RSS data, inability to determine the physical location of the attacker, and achieve positioning. High accuracy and the effect of overcoming the influence of cluster analysis

Inactive Publication Date: 2019-01-04
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the current RSS-based WLAN security detection methods can only locate a single attacker. When multiple attackers use the same identity to cooperate with each other to launch a spoofing attack, none of these methods can determine the physical location of the attacker.
3. RSS is a physical property related to wireless signals. Due to various wireless interference factors, such as synchronous interference, asynchronous interference and physical interference, RSS is easy to generate more noise. The current research method is difficult to deal with the existence of outliers Or the RSS data of large and small clusters, so that the attacker cannot be accurately located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Location method of wireless spoofing attack based on rss
  • Location method of wireless spoofing attack based on rss
  • Location method of wireless spoofing attack based on rss

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The invention provides an RSS-based wireless spoofing attack positioning method, including:

[0066] S1. Establishing a location fingerprint database corresponding to the WLAN environment;

[0067] S2. Using the beacon to monitor the wireless data packets in the WLAN in real time, and then extract and obtain the RSS data stream of each node;

[0068] S3. Use the K-central point algorithm to select multiple K values, and cluster the RSS data streams of each node in turn according to each K value to obtain the corresponding clustering results, and finally obtain multiple clustering results for each node Class results; in the K-center point algorithm, the initial value of K is 2, and the value of K is increased by 1 each time it is clustered until it reaches the preset maximum value;

[0069] S4. After evaluating multiple clustering results obtained by each node, an optimal clustering result corresponding to each node is obtained;

[0070] S5. After sequentially obtainin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RSS-based wireless spoofing attack positioning method, including: establishing a location fingerprint database corresponding to the WLAN environment; using beacons to monitor wireless data packets in the WLAN in real time, and then extracting and obtaining the RSS data stream of each node; using K ‑Central point algorithm, select multiple K values, and according to each K value, cluster the RSS data stream of each node in turn to obtain the corresponding clustering results, and finally obtain multiple clustering results for each node; for After evaluating the multiple clustering results obtained by each node, the optimal clustering result corresponding to each node is obtained; after sequentially obtaining the representative objects of multiple clusters in the optimal clustering result, combined with the location fingerprint database to calculate and obtain The location coordinates of the attacker, and output the positioning result. The invention can locate one or more attackers with high positioning accuracy and can be widely used in the field of wireless information security.

Description

technical field [0001] The invention relates to the field of wireless security research, in particular to an RSS-based wireless deception attack positioning method. Background technique [0002] Glossary: [0003] RSS: received signal strength; [0004] WLAN: Wireless Local Area Networks, wireless local area network; [0005] ISM frequency band: Industrial Scientific Medical Band, industrial, scientific and medical frequency band; [0006] ACL: access control list; [0007] AP: Access Point, access point, also called beacon in the present invention; [0008] RAP: Rogue Access Point; [0009] DoS: denial of service; [0010] MAC: Medium / Media Access Control, or MAC address, physical address, used to represent the identifier of each site on the Internet; [0011] SSID: Service Set Identifier, service set identifier, SSID technology can divide a wireless local area network into several sub-networks that require different authentication. Each sub-network requires independ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W4/02H04W64/00G01S11/06H04W12/122
CPCH04W4/025H04W12/12H04W64/00G01S11/06
Inventor 柳毅凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products