Advertisement

Research on Security Supervision on Wireless Network Space in Key Sites

  • Honghao WuEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1123)

Abstract

With the development of wireless network these years, the number of crimes caused by wireless network security problems keep rising. Once the wireless network fall in danger, there will be serious consequences. Existing stand-alone security equipment can hardly meet the security requirements of key sites, so this paper conducts deep research on Wi-Fi space security management under particular environments. We employ distributed probe set with knowledge base to implement the supervision of wireless network security in key sites. Through the extensive collection of Wi-Fi terminal, AP, channel and other information in specific areas, we realize overall monitoring and blocking towards safety behaviors such as Wi-Fi private access, illegal client access, illegal sniffing, brute force cracking, hijacking, phishing and so on. As a result, security managers can spot security behaviors related to Wi-Fi at the first time, and they can dispose the problems timely.

Keywords

Key sites Wireless network Wi-Fi Distributed probe Security supervision 

Notes

Acknowledgments

This work was supported in part by Guangdong Province Key Research and Development Plan (Grant No. 2019B010137004), the National Key research and Development Plan (Grant No. 2018YFB1800701, No. 2018YFB0803504, and No. 2018YEB1004003), and the The National Natural Science Foundation of China (Grant No. U1636215 and 61572492).

References

  1. 1.
    Lin, Q.: Research and Development of Equipment Spot Checking System Based on Wi-Fi Positioning. Dalian University of Technology, Dalian (2017)Google Scholar
  2. 2.
    Wang, J., Cheng, H., Xue, M., Hei, X.: Revisiting localization attacks in mobile app people-nearby services. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 17–30. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-72389-1_2Google Scholar
  3. 3.
    Chen, W.: Wireless network security threats and responses. Netw. Secur. Technol. Appl. 2019(01), 57–58 (2019)Google Scholar
  4. 4.
    Cao, X., Dang, L., Fan, K., Fu, Y.: An attack to an anonymous certificateless group key agreement scheme and its improvement. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 56–69. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-72389-1_5Google Scholar
  5. 5.
    Zhuang, H.: Prediction of wireless communication network security risk based on big data analysis technology. Microelectron. Comput. 36(08), 97–100 (2019)Google Scholar
  6. 6.
    Sun, W., Ding, R., Wu, C., Lin, X.: Sample-limited wireless network security access algorithm. China Sci. Technol. Inf. 2019(16), 99–101 (2019)Google Scholar
  7. 7.
    Liu, D.: Wireless network security problems and countermeasures based on wi-fi technology. Intell. Buil. Smart City 2018(09), 27–28 (2018)Google Scholar
  8. 8.
    Li, H.: Wi-Fi Positioning Technology Based on Location Fingerprint. Ningxia University, Yinchuan (2017)Google Scholar
  9. 9.
    Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. 6(2), 1584–1593 (2019)Google Scholar
  10. 10.
    Xiong, G., Liu, Z.: Design of wireless wi-fi coverage system for large exhibition center. Electr. Technol. Intell. Build. 12(05), 108–112 (2018)MathSciNetGoogle Scholar
  11. 11.
    Tian, Z., Su, S., Shi, W., Du, X., Guizani, M., Yu, X.: A data-riven model for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212–220 (2019)Google Scholar
  12. 12.
    Hu, J.: Application and security of wireless LAN technology in campus network. Electron. Technol. Softw. Eng. 2018(14), 195–203 (2018)Google Scholar
  13. 13.
    Geng, L.: End-to-End Secure Communication Scheme with Network Supervision Function in Wireless Network. Xi’an University of Electronic Science and Technology, Xi’an (2017)Google Scholar
  14. 14.
    Tian, Z., Li, M., Qin, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)Google Scholar
  15. 15.
    Tian, Z., Gao, X., Su, S., Qiu, J., Du, X., Guizani, M.: Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans. Veh. Technol. 68(6), 5971–5980 (2019)Google Scholar
  16. 16.
    Wu, K., Wei, G.: Research on security authentication technology for wireless sensor networks. Commun. Technol. 52(06), 1461–1468 (2019)Google Scholar
  17. 17.
    Lin, S.: Application and analysis of computer wireless network security technology. Wirel. Interconnect. Technol. 16(10), 13–14 (2019)Google Scholar
  18. 18.
    Bai, H., Zhang, X.: Wireless network security vulnerabilities and preventive strategies. Electron. Technol. Softw. Eng. 2019(08), 202–207 (2019)Google Scholar
  19. 19.
    Zhang, Q.: Multi-objective security optimal deployment of wireless sensor network nodes. Electron. Technol. Softw. Eng. 2019(05), 206–210 (2019)Google Scholar
  20. 20.
    Liu, Z.: Application and analysis of computer wireless network security technology. Netw. Secur. Technol. Appl. 2019(04), 61–62 (2019)Google Scholar
  21. 21.
    Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Industr. Inf. 15(7), 4285–4294 (2019)Google Scholar
  22. 22.
    Koh, J.Y., Zhang, P.: Localizing Wireless Jamming Attacks with Minimal Network Resources. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 322–334. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-72395-2_30Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Beijing Police CollegeBeijingChina

Personalised recommendations