Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A wireless device authentication method and system thereof

A wireless device and authentication method technology, applied in wireless communication, electrical components, security devices, etc., can solve the problem that the MAC address is vulnerable to tampering, and achieve the effects of reducing the pressure of device authentication, improving security, and increasing speed

Active Publication Date: 2022-06-28
JIANGSU ELECTRIC POWER CO +4
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the MAC address of the device based on the OSI upper layer protocol is vulnerable to tampering, and the authentication based on the pre-shared key requires additional communication channel support

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless device authentication method and system thereof
  • A wireless device authentication method and system thereof
  • A wireless device authentication method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0056] According to an embodiment, the MEC side gateway performs a second confirmation of whether the device is an abnormal device according to a predetermined condition; if the confirmation result is no abnormality, the device is allowed to access the network. In one example, if a device continuously sends out N abnormal device physical fingerprints within a predetermined time period, the device is confirmed as abnormal device; if more than N abnormal device physical fingerprints do not appear in the predetermined time period If the device is not abnormal, it is determined that the device is not an abnormal device.

[0057] In a specific example, the abnormal information transmitted by the WiFi local gateway can also be stored and comprehensively determined. If a device has more than N abnormal fingerprint samples continuously within a given period of time, the device is considered abnormal. The device then sends the stored abnormal fingerprint samples and their MAC addresses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a wireless device authentication method and its system, the method is based on the core network side gateway, the MEC side gateway and the WiFi local gateway, the method includes: extracting the device fingerprint from the radio frequency signal of the wireless device; extracting the device MAC from the signal data address; according to the MAC address of the device, obtain the pre-stored fingerprint of the device locally; according to whether the device fingerprint matches the pre-stored fingerprint, confirm whether the device is abnormal; if abnormal, send the device fingerprint and MAC address to the MEC side gateway; if the MEC side gateway confirms the If the device is an abnormal device, the fingerprint and MAC address of the device will be sent to the core network side gateway; if the core network side gateway confirms that the device is an abnormal device according to the overall network situation, it will send a blocking command to the MEC side gateway; if it is an access device, send a command to change the fingerprint; the MEC side gateway sends the command to the local gateway to block the access of the device. The invention can effectively identify illegal access equipment, and improves the security of equipment access.

Description

technical field [0001] The present invention relates to the technical field of wireless communication, and in particular, to a wireless device authentication method and system based on a distributed security gateway. Background technique [0002] Compared with traditional wired communication systems, wireless communication systems are more vulnerable to malicious attacks due to their openness. In view of the potential security risks in the wireless communication environment, the classic method to solve the problem of air eavesdropping is to encrypt the air data; and the effective method to solve the illegal device access is to authenticate the access device. The traditional encryption and authentication methods to protect the security of wireless communication systems are based on the OSI (Open System Interconnection Reference Model, Open System Interconnection) seven-layer model above the physical layer. Confidentiality protection and authentication of the identity of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08H04W12/79
CPCH04W12/06H04W12/08
Inventor 李伟缪巍巍刘锐戴勇张明轩李洋汪大洋李沛刘金锁蔡昊
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products