期刊文献+

基于信道指纹的无线设备身份异常检测技术研究 被引量:1

Research on Channel Fingerprinting-Based Wireless Device Identity Anomaly Detection Technology
下载PDF
导出
摘要 随着无线技术的快速发展以及无线通信基础设施的广泛覆盖,无线网络已经成为人们日常生活中的必需品.但是,层出不穷的无线设备假冒攻击使得无线网络的安全性受到极大的挑战.加密系统是抵抗假冒攻击的传统方案,但是其对于无线网络安全性的提升建立在系统生产成本和计算复杂度的增加上,同时破解技术的不断升级也对其安全性带来了威胁.提出了一个非加密型的无线设备身份异常检测系统.该系统使用细粒度的信道状态信息生成指纹,这种指纹携带设备的物理属性因此难以被伪造.该系统利用信道指纹构建本地设备校验文件,并借助局部离群因子算法结合校验文件来验证设备的身份.考虑到信道指纹的位置敏感性,提供了一种安全的校验文件更新方法,该方法能够避免对位置改变的合法设备产生误判,同时能够检测出试图干扰校验文件更新的假冒者.实验表明,该系统具有较高的异常检测准确率,在无线网络安全中具有良好的应用前景. With the rapid development of wireless technology and the broad coverage of wireless communication infrastructure,wireless network has become a necessity in people’s daily life.However,the endless impersonation attacks have greatly challenged the security of wireless network.Encryption system is a traditional solution to resist these attacks,but its improvement of security is based on the increase of system production cost and computational complexity.At the same time,the continuous upgrade of cracking techniques also poses a threat to its security.This paper proposes a non-cryptographic wireless device identity anomaly detection system.The system uses fine-grained channel state information(CSI)to generate channel fingerprinting,which is difficult to forge because of the physical properties of device.The system uses channel fingerprinting to construct local device calibration files.Then it uses the local outlier factor(LOF)algorithm to verify devices’ identity,combined with calibration file.Considering the location sensitivity of channel fingerprinting,we provide a secure calibration file update method,which can avoid misjudgment of legal devices whose location have changed.It can also detect impostors who try to interfere with the update.Experiments showed that this system has a high accuracy rate of anomaly detection,which has a good application prospect in wireless network security.
作者 陈冰 宋宇波 施麟 朱珍超 郑天宇 陈宏远 吴天琦 Chen Bing;Song Yubo;Shi Lin;Zhu Zhenchao;Zheng Tianyu;Chen Hongyuan;Wu Tianqi(School of Cyber Science and Engineering,Southeast University,Nanjing 211189;School of Information Science and Engineering,Southeast University,Nanjing 211189;Key Laboratory of Computer Network Technology of Jiangsu Province,Nanjing 210096;Purple Mountain Laboratories,Nanjing 211111;Jiangsu Provincial Finance Department Information Management Center,Nanjing 210024)
出处 《信息安全研究》 2021年第9期849-855,共7页 Journal of Information Security Research
基金 国家重点研发计划项目(2020YFE0200600)。
关键词 无线安全 无线设备身份异常检测 信道指纹 信道状态信息 局部离群因子 wireless security wireless device identity anomaly detection channel fingerprinting channel state information local outlier factor
  • 相关文献

参考文献3

二级参考文献21

  • 1IEEE 802.11. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications [ S ]. America, ISO/IEC, 1999,17 - 21.
  • 2Nikita Borisov, Ian Goldberg, David Wagner. Intercepting mobile communications: the insecurity of 802. 11 [A]. MobiCom' 01: Proceedings of the 7^th Annual International Conference on Mobile Computing and Networking[ C ]. New York : ACM Press,2001 : 180- 189.
  • 3Arbaugh W A, Shankar N, Wan Y J . Your 802.11 wireless network has no clothes [ EB/OL]. http://www. cs. umd. edu/ waa/wireless.pdf,2001,3.
  • 4Arbaugh W A. An inductive chosen plalntext attack against WEP/ WEP2[ N]. IEEE Document 802.11 -01/230,2001,5.
  • 5Walker J R. Unsafe at any key size; an analysis of the WEP encapsulation[ N]. IEEE Document 802.11 -00/362,2000,10.
  • 6IEEE802. 11 i. IEEE Standard for information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements part 11 : Wireless LAN Medium Access control (MAC) and Physical Layer (PHY) specifications : Medium Access Control ( MAC ) Security Enhancements[ S ]. America, ISO/IEC, 2004 : 1 - 341.
  • 7IEEE802.1 x. IEEE Standard for Local and Metropolitan Area Networks - Port- Based Network Access Control[ S]. America, ISO/IEC, 2001,1 - 167.
  • 8GoldWasser S , Micali S. Probabilistic encryption [ J ]. Journal Computer and System Sciences, 1984,4 (28) :270 - 299.
  • 9Micali S, Rackoff C, Sloan R. The notion of security for probabilistic cryptosystems[ J]. SIAMJ. of Computing, 1988,4:412 -426.
  • 10Yao A C. Theory and applications of trapdoor functions[ A]. In Proceedings of the 23^rd Symposium on Foundations of Computer Science[ C]. IEEE, 1982.

共引文献7

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部