Skip to main content

2018 | OriginalPaper | Buchkapitel

Topic Model Based Management Frame Authentication Using CSI Information

verfasst von : Zhao Yang, Wei Xi, Kun Zhao, Xiaohong Wang, Colin Allen, Jizhong Zhao

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Traditionally, it is considered that there is no sensitive information in the management frames and only the data frames need encryption protection in the initial 802.11 standard protocol, so no corresponding security mechanism is required in the management frames. But with the popularity of WLAN, the researchers realize that the lack of the management frames security mechanism can lead to many security problems. For example, an attacker can constantly transmit fake management frames to dissociate normal connection between the AP and the legitimate station. Therefore, the management frames security mechanism must be established.
In this paper, we propose a topic model based method to realize the authentication of Wi-Fi management frames using the Channel State Information (CSI). CSI values have a strong correlation with location. That means CSI values between the AP and the legitimate station have significant distinction with the CSI values between the AP and the attacker. We utilize the topic model – an unsupervised machine learning method to extract features automatically from the collected CSI values. Extensive experiments are conducted to analysis the system performance. The experiments prove that topic model can better resist noise interference than the traditional method and achieve average 91% accuracy of the management frame authentication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bakthavathsalu, K., Sampalli, S., Ye, Q.: Management frame attacks in Wimax networks: analysis and prevention. In: Seventh International Conference on Wireless and Optical Communications Networks, pp. 1–7 (2010) Bakthavathsalu, K., Sampalli, S., Ye, Q.: Management frame attacks in Wimax networks: analysis and prevention. In: Seventh International Conference on Wireless and Optical Communications Networks, pp. 1–7 (2010)
3.
Zurück zum Zitat Blei, D.: Probabilistic topic models. In: ACM SIGKDD International Conference Tutorials, p. 5 (2011) Blei, D.: Probabilistic topic models. In: ACM SIGKDD International Conference Tutorials, p. 5 (2011)
4.
Zurück zum Zitat Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. Arch. 3, 993–1022 (2003)MATH Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. Arch. 3, 993–1022 (2003)MATH
5.
Zurück zum Zitat Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202 (2007) Chen, Y., Trappe, W., Martin, R.P.: Detecting and localizing wireless spoofing attacks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 193–202 (2007)
6.
Zurück zum Zitat Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: ACM Conference on Wireless Network Security, pp. 89–98 (2010) Danev, B., Luecken, H., Capkun, S., Defrawy, K.E.: Attacks on physical-layer identification. In: ACM Conference on Wireless Network Security, pp. 89–98 (2010)
7.
Zurück zum Zitat Ge, W., Li, J., Sampalli, S.: Prevention of management frame attacks on 802.11 WLANs. Int. J. Wirel. Mob. Comput. 3, 133–144 (2009)CrossRef Ge, W., Li, J., Sampalli, S.: Prevention of management frame attacks on 802.11 WLANs. Int. J. Wirel. Mob. Comput. 3, 133–144 (2009)CrossRef
8.
Zurück zum Zitat Guo, F., Chiueh, T.: Sequence number-based MAC address spoof detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 309–329 (2005) Guo, F., Chiueh, T.: Sequence number-based MAC address spoof detection. In: International Workshop on Recent Advances in Intrusion Detection, pp. 309–329 (2005)
9.
Zurück zum Zitat Jiang, Z., Zhao, J., Li, X.Y., Han, J., Xi, W.: Rejecting the attack: source authentication for wi-fi management frames using csi information. Proc. IEEE Infocom 12(11), 2544–2552 (2013) Jiang, Z., Zhao, J., Li, X.Y., Han, J., Xi, W.: Rejecting the attack: source authentication for wi-fi management frames using csi information. Proc. IEEE Infocom 12(11), 2544–2552 (2013)
10.
Zurück zum Zitat Kaur, J.: MAC layer management frame denial of service attacks. In: International Conference on Micro-Electronics and Telecommunication Engineering, pp. 155–160 (2017) Kaur, J.: MAC layer management frame denial of service attacks. In: International Conference on Micro-Electronics and Telecommunication Engineering, pp. 155–160 (2017)
11.
Zurück zum Zitat Liu, Y., Ning, P.: Enhanced wireless channel authentication using time-synched link signature. In: Proceedings of INFOCOM, pp. 2636–2640. IEEE (2012) Liu, Y., Ning, P.: Enhanced wireless channel authentication using time-synched link signature. In: Proceedings of INFOCOM, pp. 2636–2640. IEEE (2012)
12.
Zurück zum Zitat Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)CrossRef Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)CrossRef
13.
Zurück zum Zitat Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-fi!. In: International Conference on Mobile Computing and Networking, pp. 593–604 (2014) Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with Wi-fi!. In: International Conference on Mobile Computing and Networking, pp. 593–604 (2014)
14.
Zurück zum Zitat Wang, W., Wang, H.: Weakness in 802.11w and an improved mechanism on protection of management frame. In: International Conference on Wireless Communications and Signal Processing, pp. 1–4 (2011) Wang, W., Wang, H.: Weakness in 802.11w and an improved mechanism on protection of management frame. In: International Conference on Wireless Communications and Signal Processing, pp. 1–4 (2011)
15.
Zurück zum Zitat Wang, Y., Wu, K., Ni, L.M.: Wifall: device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 16(2), 581–594 (2017)CrossRef Wang, Y., Wu, K., Ni, L.M.: Wifall: device-free fall detection by wireless networks. IEEE Trans. Mob. Comput. 16(2), 581–594 (2017)CrossRef
16.
Zurück zum Zitat Wei, X., Croft, W.B.: LDA-based document models for ad-hoc retrieval, pp. 178–185 (2006) Wei, X., Croft, W.B.: LDA-based document models for ad-hoc retrieval, pp. 178–185 (2006)
17.
Zurück zum Zitat Yen, C.W., Mao, J.L.: Method of processing management frame and related communication device (2015) Yen, C.W., Mao, J.L.: Method of processing management frame and related communication device (2015)
Metadaten
Titel
Topic Model Based Management Frame Authentication Using CSI Information
verfasst von
Zhao Yang
Wei Xi
Kun Zhao
Xiaohong Wang
Colin Allen
Jizhong Zhao
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_15