Full model false AP detection method and detection device based on phase error drift range
A phase error and detection method technology, applied in the field of communication security, can solve problems affecting the accuracy of detection results, fingerprint coincidence, false negatives, etc., achieve good stability and effectiveness, low cost, and avoid privacy leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] FP
[0072] 'S': 0.00}
[0073] Wherein, SSID represents the service set identifier of the AP device, and MAC represents the physical address of the AP device.
[0076] 'MAC': 00:4A:2F:DB:61:80,
[0080] Then, according to the legitimacy of each AP, their fingerprints are added to the legal AP fingerprint database or the illegal AP fingerprint database. value
[0089] If D
[0095] As an embodiment of the present invention, when the pseudo AP is determined, the AP is located in combination with the CSI of the pseudo AP. Among them, CSI
Embodiment 2
[0099] The legitimacy detection module is used to collect fingerprints of APs to be detected and perform legitimacy detection. Detect devices connected by
[0101] For the implementation method of the device part, reference may be made to Embodiment 1, which will not be repeated here.
Embodiment 3
[0105] First, connect to the target AP, collect the CSI data of the target AP, and process it to extract phase information.
[0106] Second, according to the fingerprint production scheme proposed by the present invention, the phase error drift range fingerprint of the target AP is produced.
[0107] Third, compare the target AP fingerprint with the legal fingerprint. According to the SSID and MAC address of the target AP, fingerprint from the legal AP
[0108] The computer program realizes the following operations when entering the traceability identification module: traceability identification is carried out to the RAP. will RAP
[0109] Of course, the computer program of this embodiment can also execute each process step of Embodiment 1, which will not be repeated here.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


