Method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification

A correlation attack and prime number technology, applied in the field of communication, can solve the problems of forgery of disconnected authentication correlation frames, failure of RARP to detect forged frames, etc., and achieve the effect of increasing difficulty, high authentication success rate, and good protocol compatibility

Active Publication Date: 2018-05-01
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem is that most of the forged frames can be forged from the MAC address to the IP address, so that the forged frames cannot be detected using RARP
However, the attacker can predict the serial number of the frame to be sent by continuously monitoring the air frame information, and then construct a fake frame to send, and then carry out the attack
In summary, the reason why it is easy to send a disconnect authentication association attack is that the disconnect authentication association frame is easily forged by an attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification
  • Method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification
  • Method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0049] The technical scheme that the present invention solves the problems of the technologies described above is:

[0050] A method for preventing WLAN disconnection attacks based on prime number decomposition verification includes the following steps:

[0051] Step 1: First, the STA locally establishes the global data structure assoc_ap_info. The members include: AP_BSSID, For_AP_Prime_p, For_AP_Prime_q, For_AP_Compo_n, RX_AP_Compo_N, which are used to store the BSSID of the associated AP, the large prime number p generated for the associated AP, and the large prime number generated for the associated AP. q, the large composite number n=p*q generated for the associated AP, and the large composite number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing WLAN (Wireless Local Area Network) association-breaking attack based on prime factorization verification, and belongs to the technical field of communication. The method comprises the following steps that: a STA (Station) transmits an association request frame carrying a generated large composite number; an AP (Access Point) receives the associationrequest frame; the AP transmits an association response frame carrying the generated large composite number; the STA receives the association response frame; the STA transmits a breaking authentication association frame carrying a large prime number; the AP receives the breaking authentication association frame and verifies the large prime number in the breaking authentication association frame; the AP transmits the breaking authentication association frame carrying the large prime number; and the STA receives the breaking authentication association frame and verifies the large prime number inthe breaking authentication association frame. The STA and the AP generate the large prime number and the large composite number which are required during association breaking of the other party at an association stage, and the transmission of the large composite and the large prime number is realized through a frame extension field. Frame reception is authenticated at a breaking stage, so that the STA and the AP are protected from being disconnected exceptionally due to an association-breaking authentication frame transmitted by a malicious third party. Through adoption of the method, the security, protocol compatibility and authentication success rate are improved greatly.

Description

technical field [0001] The invention belongs to the technical field of communications, and relates to a method for preventing WLAN disconnection attacks based on prime number decomposition verification. Background technique [0002] With the continuous development of wireless network technology, Wireless Local Area Networks (WLAN, Wireless Local Area Networks) have been widely used in various occasions, whether in airports, stations, city squares, commercial centers, or in companies, university campuses, or even personal In a home, a large number of wireless access points (AP, Wireless Access Point) are deployed for various wireless terminals (STA, Station) to perform wireless access and use network services. Different from the wired network, the data transmission between AP and STA of WLAN does not rely on any wired medium, it relies on radio waves as the transmission medium, and the data frame exists in the form of broadcast in the air, and the rate can reach 54Mbps, 300Mb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/101H04L63/1458
Inventor 赵国锋叶飞徐川赵岩张明聪何英
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products