Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for identifying fake wifi using physical layer information

A physical layer information and physical layer technology, applied in wireless communication, security devices, network topology, etc., can solve the problems of reduced implementability, low security, and limited recognition scenarios, so as to achieve diverse use scenarios and improve security Sexuality, the effect of wide recognition scene

Active Publication Date: 2019-07-19
PEKING UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, this patent does not mention the method of issuing the RSA public key. During the process of the RSA public key method, masquerading may also occur, such as disguising WiFi to send a fake public key to complete the subsequent authentication process.
[0007] 2) Recognition scenarios are limited, making it inconvenient to promote and use
Some identification technologies can only be used to identify fake WiFi when real WiFi and fake WiFi exist simultaneously, for example, researchers from University College London in the literature (Jie Xiong, Kyle Jamieson, "SecureArray Improving WiFi Security with Fine-Grained Physical-Layer Information”, MobiCom 2013) proposed to use the angle of the received signal to identify the source of the signal. However, this method must work when the real WiFi and the fake WiFi exist at the same time and the distance is more than 5 cm, and it cannot work when the fake WiFi exists alone.
In contrast, some identification technologies can only be identified when the fake WiFi exists alone. For example, the patent mentioned in 1) above (a method, system and system working method for identifying fake WiFi, application number / patent number 201610804042X) cannot Works when real WiFi and fake WiFi exist at the same time
Some identification technologies require other hardware intervention. For example, researchers from the University of Michigan proposed the use of wireless relays in the literature (Xianru Du, DanShan, Kai Zeng, Lauren Huie, "Physical layer challenge-response authentication in wireless networks with relay", INFOCOMM2014) The method to identify the signal source, the disadvantage of this method is that it must work in the scenario where authenticated relay nodes are deployed
[0008] 3) Not compatible with deployed WiFi networks
Specifically, some methods for identifying fake WiFi require customization or high requirements for WiFi access point hardware. If these methods are to be applied, the deployed WiFi devices need to replace hardware, which will cause a huge waste of resources and reduce the implementation sex
For example, researchers from Nanjing University analyzed how to implement MU-MIMO (Multi-UserMultiple Input Multiple Output, multi-user multiple input multiple output) In the wireless network, the channel information in the physical layer information is used to prevent the downlink data from being eavesdropped. However, this method requires the WiFi access point to encrypt a specific field of the message. However, currently deployed WiFi access point devices do not support such operations
[0009] To sum up, the existing methods for identifying fake WiFi are not very safe, or cannot identify fake WiFi in various scenarios, or cannot be compatible with deployed WiFi networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for identifying fake wifi using physical layer information
  • A method and system for identifying fake wifi using physical layer information
  • A method and system for identifying fake wifi using physical layer information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0044] The present invention provides a method for identifying fake WiFi by using physical layer information, including a method for collecting physical layer information, a method for calculating physical layer characteristics, and a method for identifying fake WiFi; wherein, the method for collecting physical layer information is divided into Two steps, the first step is to select the appropriate physical layer information, the selection strategy is to select the information related to the equipment, and exclude the information related to other factors such as the environment, the selection result is the frequency offset of the received signal, the constellation point offset, and The correlation degree of the sent signal, the second step is to collect these physical layer information, the collection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for recognizing camouflaged WiFi by use of physical layer information and a wifi system. The method comprises performing acquisition processing on the physical layer information and recognizing the camouflaged wifi; the acquisition processing on the physical layer information is as follows: acquiring physical layer information from a signal received by a WiFi receiving end, and computing in the physical layer information to obtain a physical layer feature; the recognition of the camouflaged WiFi is as follows: recognizing a source of a physical layer frame of the signal received by the WiFi receiving end, recognizing whether the source is the camouflaged WiFi or the real WiFi. The WiFi system further comprises a physical layer information acquisition interface, a physical layer feature computing module, a camouflaged WiFi judgement module and a user interaction interface on the basis of GRT system. The technical scheme disclosed by the invention can solve an attack problem of the camouflaged WiFi under multiple scenes, the security of the WiFi network is improved; the system has the technical advantages of high security and diverse use scene and being compatible with the existing WiFi network.

Description

technical field [0001] The invention belongs to the field of wireless communication, and relates to a technology for identifying masquerading behaviors in a WiFi network, in particular to a method and system for identifying a WiFi masquerading as a specific network by using physical layer information. Background technique [0002] In modern society, with the popularization of mobile terminals and the increase of people's demand for networks, WiFi has become an indispensable resource in life and an important entrance to connect people and information networks. Now WiFi is becoming more and more popular. People deploy WiFi at home for networking of smart devices such as mobile phones, smart TVs, and laptops; deploy WiFi in companies for daily work and teamwork; deploy in public places such as airports and cafes WiFi, merchants provide convenience for customers; WiFi is deployed in the Internet of Things, such as a camera network, for communication between IoT devices. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W84/12
CPCH04W12/12H04W84/12
Inventor 王韬李晓光吴浩洋吕松武
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products