Unlock instant, AI-driven research and patent intelligence for your innovation.

RSS-based method and device for malicious access points with unknown transmission power

A technology of transmission power and access point, which is applied in the direction of location information-based services, measurement devices, security devices, etc., and can solve problems such as uneven resource allocation and low device throughput

Active Publication Date: 2020-07-07
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an RSS-based method for malicious access points with unknown transmission power to solve the defects of low device throughput or uneven resource allocation in the existing packet scheduling algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSS-based method and device for malicious access points with unknown transmission power
  • RSS-based method and device for malicious access points with unknown transmission power
  • RSS-based method and device for malicious access points with unknown transmission power

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] The distance-based positioning algorithm obtains the distance from the known monitoring terminal to the AP according to the path loss model, and then estimates the location of the AP to be tested. In a practical environment, the strength of the wireless signal sent from the AP will decrease with the distance from the terminal receiving the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an RSS-based method and device for a malicious access point with unknown transmission power. The method first obtains the initial position of the malicious access point through a distance-based positioning method, and then uses a simplified fingerprint-based method to improve the positioning accuracy. The method according to the invention also gives robust estimation intervals for localization effects of transmit power. The method proposed by the invention can robustly and accurately locate malicious access points without knowing the transmission power.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of wireless network environment, and in particular to an RSS-based method and device for facing malicious access points with unknown transmission power. Background technique [0002] With the maturity of IEEE 802.11 technology, wireless network technology has been widely used. Especially in public places such as hotels and office buildings, a large number of wireless networks are covered. Many rogue access points, also known as rogue access points (RAPs), are commonly found in wireless network environments. The existence of rogue access point (RAP) poses a huge security threat to the wireless network environment. If these rogue access points are not found and eliminated in time, serious network damage and data loss will be caused, posing a huge security threat to the wireless network environment. Therefore, it is very important to quickly locate the RAP. In the prior art, based on t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W12/12H04W64/00G06K9/62G01S11/06H04W12/122
CPCH04W4/02H04W4/023H04W12/12H04W64/00G01S11/06G06F18/23213
Inventor 吴荻朱大立刘开颜关岩
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI