Method and system for illegal invasion identification base on wireless network signal CO complexity

A technology of illegal intrusion and identification method, applied in wireless communication, electrical components, security devices, etc., can solve the problems of difficult illegal user intrusion, wireless network security loopholes, etc.

Inactive Publication Date: 2017-08-29
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional wireless network illegal intrusion detection is mainly based on key authentication, digital certificates, etc. Once the key is leaked or the dig

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for illegal invasion identification base on wireless network signal CO complexity
  • Method and system for illegal invasion identification base on wireless network signal CO complexity
  • Method and system for illegal invasion identification base on wireless network signal CO complexity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with the accompanying drawings and embodiments. In the present invention, take collecting a wireless network card signal of a DareGlobal DW505USB interface as an example.

[0063] Radiation source fingerprint identification technology can subvert the existing wireless network security mechanism based on keys and digital certificates, and completely solve the huge threat in the field of information security. The invention belongs to the field of wireless network / information security protection, and specifically relates to the "fingerprint" feature extraction technology of wireless network terminal equipment, which refers to the use of the unique "fingerprint" feature contained in the transmitted signals of different terminals connected to the wireless network to distinguish legitimate users from illegal users. user's method.

[0064] Such as Figure 1-8 As shown, in the first embodiment of the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for illegal invasion identification base on wireless network signal CO complexity, and relates to the information safety protection field. The method comprises the following steps: firstly, performing signal direct current subtracting processing of an original wireless network signal sequence, obtaining a direct current subtracting signal sequence, performing signal Fourier transform processing, and obtaining a Fourier transform sequence; secondary, according to a threshold energy value, performing sequence reconstruction of the Fourier transform sequence, and solving the estimation value of the CO complexity; and finally, employing a nearest neighbor method to perform identification of the illegal invasion. Besides, the present invention further discloses a system for illegal invasion identification base on the wireless network signal CO complexity. The method and system for illegal invasion identification base on the wireless network signal CO complexity do not depend on traditional wireless network safety protection means such as passwords, MAC address verification, digital watermarking and the like to thoroughly solve the safety threats such as password leakage, MAC address falsification or digital watermarking and the like; and moreover, the calculation efficiency is high, and processing delay is little.

Description

technical field [0001] The invention relates to the field of wireless network / information security protection, in particular to an illegal intrusion identification method and system based on the CO complexity of wireless network signals. Background technique [0002] Radiation source fingerprint recognition, also known as radiation source fine feature recognition, refers to a technology that uses the "fingerprint" contained in the radiation source signal to identify individuals. Just as human fingerprints are different, due to differences in components and production debugging processes, there will be subtle differences between individual wireless network terminals of the same manufacturer, same model, and same production batch. This difference is manifested in The signal it emits is called the "fingerprint" feature of the individual radiation source. [0003] Traditional wireless network intrusion detection is mainly based on key authentication, digital certificates, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/12
CPCH04W12/06H04W12/12
Inventor 黄知涛王翔王丰华黄光泉梁江海杨凯
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products