Abstract
With the development of wireless network these years, the number of crimes caused by wireless network security problems keep rising. Once the wireless network fall in danger, there will be serious consequences. Existing stand-alone security equipment can hardly meet the security requirements of key sites, so this paper conducts deep research on Wi-Fi space security management under particular environments. We employ distributed probe set with knowledge base to implement the supervision of wireless network security in key sites. Through the extensive collection of Wi-Fi terminal, AP, channel and other information in specific areas, we realize overall monitoring and blocking towards safety behaviors such as Wi-Fi private access, illegal client access, illegal sniffing, brute force cracking, hijacking, phishing and so on. As a result, security managers can spot security behaviors related to Wi-Fi at the first time, and they can dispose the problems timely.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lin, Q.: Research and Development of Equipment Spot Checking System Based on Wi-Fi Positioning. Dalian University of Technology, Dalian (2017)
Wang, J., Cheng, H., Xue, M., Hei, X.: Revisiting localization attacks in mobile app people-nearby services. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 17–30. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_2
Chen, W.: Wireless network security threats and responses. Netw. Secur. Technol. Appl. 2019(01), 57–58 (2019)
Cao, X., Dang, L., Fan, K., Fu, Y.: An attack to an anonymous certificateless group key agreement scheme and its improvement. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 56–69. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_5
Zhuang, H.: Prediction of wireless communication network security risk based on big data analysis technology. Microelectron. Comput. 36(08), 97–100 (2019)
Sun, W., Ding, R., Wu, C., Lin, X.: Sample-limited wireless network security access algorithm. China Sci. Technol. Inf. 2019(16), 99–101 (2019)
Liu, D.: Wireless network security problems and countermeasures based on wi-fi technology. Intell. Buil. Smart City 2018(09), 27–28 (2018)
Li, H.: Wi-Fi Positioning Technology Based on Location Fingerprint. Ningxia University, Yinchuan (2017)
Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. 6(2), 1584–1593 (2019)
Xiong, G., Liu, Z.: Design of wireless wi-fi coverage system for large exhibition center. Electr. Technol. Intell. Build. 12(05), 108–112 (2018)
Tian, Z., Su, S., Shi, W., Du, X., Guizani, M., Yu, X.: A data-riven model for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212–220 (2019)
Hu, J.: Application and security of wireless LAN technology in campus network. Electron. Technol. Softw. Eng. 2018(14), 195–203 (2018)
Geng, L.: End-to-End Secure Communication Scheme with Network Supervision Function in Wireless Network. Xi’an University of Electronic Science and Technology, Xi’an (2017)
Tian, Z., Li, M., Qin, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)
Tian, Z., Gao, X., Su, S., Qiu, J., Du, X., Guizani, M.: Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans. Veh. Technol. 68(6), 5971–5980 (2019)
Wu, K., Wei, G.: Research on security authentication technology for wireless sensor networks. Commun. Technol. 52(06), 1461–1468 (2019)
Lin, S.: Application and analysis of computer wireless network security technology. Wirel. Interconnect. Technol. 16(10), 13–14 (2019)
Bai, H., Zhang, X.: Wireless network security vulnerabilities and preventive strategies. Electron. Technol. Softw. Eng. 2019(08), 202–207 (2019)
Zhang, Q.: Multi-objective security optimal deployment of wireless sensor network nodes. Electron. Technol. Softw. Eng. 2019(05), 206–210 (2019)
Liu, Z.: Application and analysis of computer wireless network security technology. Netw. Secur. Technol. Appl. 2019(04), 61–62 (2019)
Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Industr. Inf. 15(7), 4285–4294 (2019)
Koh, J.Y., Zhang, P.: Localizing Wireless Jamming Attacks with Minimal Network Resources. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 322–334. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_30
Acknowledgments
This work was supported in part by Guangdong Province Key Research and Development Plan (Grant No. 2019B010137004), the National Key research and Development Plan (Grant No. 2018YFB1800701, No. 2018YFB0803504, and No. 2018YEB1004003), and the The National Natural Science Foundation of China (Grant No. U1636215 and 61572492).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, H. (2019). Research on Security Supervision on Wireless Network Space in Key Sites. In: Wang, G., Bhuiyan, M.Z.A., De Capitani di Vimercati, S., Ren, Y. (eds) Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123. Springer, Singapore. https://doi.org/10.1007/978-981-15-1304-6_34
Download citation
DOI: https://doi.org/10.1007/978-981-15-1304-6_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1303-9
Online ISBN: 978-981-15-1304-6
eBook Packages: Computer ScienceComputer Science (R0)