Skip to main content
Top

2018 | OriginalPaper | Chapter

Topic Model Based Management Frame Authentication Using CSI Information

Authors : Zhao Yang, Wei Xi, Kun Zhao, Xiaohong Wang, Colin Allen, Jizhong Zhao

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Traditionally, it is considered that there is no sensitive information in the management frames and only the data frames need encryption protection in the initial 802.11 standard protocol, so no corresponding security mechanism is required in the management frames. But with the popularity of WLAN, the researchers realize that the lack of the management frames security mechanism can lead to many security problems. For example, an attacker can constantly transmit fake management frames to dissociate normal connection between the AP and the legitimate station. Therefore, the management frames security mechanism must be established.
In this paper, we propose a topic model based method to realize the authentication of Wi-Fi management frames using the Channel State Information (CSI). CSI values have a strong correlation with location. That means CSI values between the AP and the legitimate station have significant distinction with the CSI values between the AP and the attacker. We utilize the topic model – an unsupervised machine learning method to extract features automatically from the collected CSI values. Extensive experiments are conducted to analysis the system performance. The experiments prove that topic model can better resist noise interference than the traditional method and achieve average 91% accuracy of the management frame authentication.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bakthavathsalu, K., Sampalli, S., Ye, Q.: Management frame attacks in Wimax networks: analysis and prevention. In: Seventh International Conference on Wireless and Optical Communications Networks, pp. 1–7 (2010) Bakthavathsalu, K., Sampalli, S., Ye, Q.: Management frame attacks in Wimax networks: analysis and prevention. In: Seventh International Conference on Wireless and Optical Communications Networks, pp. 1–7 (2010)
3.
go back to reference Blei, D.: Probabilistic topic models. In: ACM SIGKDD International Conference Tutorials, p. 5 (2011) Blei, D.: Probabilistic topic models. In: ACM SIGKDD International Conference Tutorials, p. 5 (2011)
4.
go back to reference Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. Arch. 3, 993–1022 (2003)MATH Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. Arch. 3, 993–1022 (2003)MATH
5.
go back to reference Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202 (2007) Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202 (2007)
6.
go back to reference Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: ACM Conference on Wireless Network Security, pp. 89–98 (2010) Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: ACM Conference on Wireless Network Security, pp. 89–98 (2010)
7.
go back to reference Ge, W., Li, J., Sampalli, S.: Prevention of management frame attacks on 802.11 WLANs. Int. J. Wirel. Mob. Comput. 3, 133–144 (2009)CrossRef Ge, W., Li, J., Sampalli, S.: Prevention of management frame attacks on 802.11 WLANs. Int. J. Wirel. Mob. Comput. 3, 133–144 (2009)CrossRef
8.
go back to reference Guo, F., Chiueh, T.: Sequence number-based MAC address spoof detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 309–329 (2005) Guo, F., Chiueh, T.: Sequence number-based MAC address spoof detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 309–329 (2005)
9.
go back to reference Jiang, Z., Zhao, J., Li, X.Y., Han, J., Xi, W.: Rejecting the attack: source authentication for wi-fi management frames using csi information. Proc. IEEE Infocom 12(11), 2544–2552 (2013) Jiang, Z., Zhao, J., Li, X.Y., Han, J., Xi, W.: Rejecting the attack: source authentication for wi-fi management frames using csi information. Proc. IEEE Infocom 12(11), 2544–2552 (2013)
10.
go back to reference Kaur, J.: MAC layer management frame denial of service attacks. In: International Conference on Micro-Electronics and Telecommunication Engineering, pp. 155–160 (2017) Kaur, J.: MAC layer management frame denial of service attacks. In: International Conference on Micro-Electronics and Telecommunication Engineering, pp. 155–160 (2017)
11.
go back to reference Liu, Y., Ning, P.: Enhanced wireless channel authentication using time-synched link signature. In: Proceedings of INFOCOM, pp. 2636–2640. IEEE (2012) Liu, Y., Ning, P.: Enhanced wireless channel authentication using time-synched link signature. In: Proceedings of INFOCOM, pp. 2636–2640. IEEE (2012)
12.
go back to reference Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)CrossRef Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)CrossRef
13.
go back to reference Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-fi!. In: International Conference on Mobile Computing and Networking, pp. 593–604 (2014) Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-fi!. In: International Conference on Mobile Computing and Networking, pp. 593–604 (2014)
14.
go back to reference Wang, W., Wang, H.: Weakness in 802.11w and an improved mechanism on protection of management frame. In: International Conference on Wireless Communications and Signal Processing, pp. 1–4 (2011) Wang, W., Wang, H.: Weakness in 802.11w and an improved mechanism on protection of management frame. In: International Conference on Wireless Communications and Signal Processing, pp. 1–4 (2011)
15.
go back to reference Wang, Y., Wu, K., Ni, L.M.: Wifall: device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 16(2), 581–594 (2017)CrossRef Wang, Y., Wu, K., Ni, L.M.: Wifall: device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 16(2), 581–594 (2017)CrossRef
16.
go back to reference Wei, X., Croft, W.B.: LDA-based document models for ad-hoc retrieval, pp. 178–185 (2006) Wei, X., Croft, W.B.: LDA-based document models for ad-hoc retrieval, pp. 178–185 (2006)
17.
go back to reference Yen, C.W., Mao, J.L.: Method of processing management frame and related communication device (2015) Yen, C.W., Mao, J.L.: Method of processing management frame and related communication device (2015)
Metadata
Title
Topic Model Based Management Frame Authentication Using CSI Information
Authors
Zhao Yang
Wei Xi
Kun Zhao
Xiaohong Wang
Colin Allen
Jizhong Zhao
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_15

Premium Partner