Skip to main content

Research on Security Supervision on Wireless Network Space in Key Sites

  • Conference paper
  • First Online:
Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1123))

  • 1002 Accesses

Abstract

With the development of wireless network these years, the number of crimes caused by wireless network security problems keep rising. Once the wireless network fall in danger, there will be serious consequences. Existing stand-alone security equipment can hardly meet the security requirements of key sites, so this paper conducts deep research on Wi-Fi space security management under particular environments. We employ distributed probe set with knowledge base to implement the supervision of wireless network security in key sites. Through the extensive collection of Wi-Fi terminal, AP, channel and other information in specific areas, we realize overall monitoring and blocking towards safety behaviors such as Wi-Fi private access, illegal client access, illegal sniffing, brute force cracking, hijacking, phishing and so on. As a result, security managers can spot security behaviors related to Wi-Fi at the first time, and they can dispose the problems timely.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lin, Q.: Research and Development of Equipment Spot Checking System Based on Wi-Fi Positioning. Dalian University of Technology, Dalian (2017)

    Google Scholar 

  2. Wang, J., Cheng, H., Xue, M., Hei, X.: Revisiting localization attacks in mobile app people-nearby services. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 17–30. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_2

    Chapter  Google Scholar 

  3. Chen, W.: Wireless network security threats and responses. Netw. Secur. Technol. Appl. 2019(01), 57–58 (2019)

    Google Scholar 

  4. Cao, X., Dang, L., Fan, K., Fu, Y.: An attack to an anonymous certificateless group key agreement scheme and its improvement. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 56–69. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_5

    Chapter  Google Scholar 

  5. Zhuang, H.: Prediction of wireless communication network security risk based on big data analysis technology. Microelectron. Comput. 36(08), 97–100 (2019)

    Google Scholar 

  6. Sun, W., Ding, R., Wu, C., Lin, X.: Sample-limited wireless network security access algorithm. China Sci. Technol. Inf. 2019(16), 99–101 (2019)

    Google Scholar 

  7. Liu, D.: Wireless network security problems and countermeasures based on wi-fi technology. Intell. Buil. Smart City 2018(09), 27–28 (2018)

    Google Scholar 

  8. Li, H.: Wi-Fi Positioning Technology Based on Location Fingerprint. Ningxia University, Yinchuan (2017)

    Google Scholar 

  9. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.: Toward a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. 6(2), 1584–1593 (2019)

    Article  Google Scholar 

  10. Xiong, G., Liu, Z.: Design of wireless wi-fi coverage system for large exhibition center. Electr. Technol. Intell. Build. 12(05), 108–112 (2018)

    MathSciNet  Google Scholar 

  11. Tian, Z., Su, S., Shi, W., Du, X., Guizani, M., Yu, X.: A data-riven model for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212–220 (2019)

    Article  Google Scholar 

  12. Hu, J.: Application and security of wireless LAN technology in campus network. Electron. Technol. Softw. Eng. 2018(14), 195–203 (2018)

    Google Scholar 

  13. Geng, L.: End-to-End Secure Communication Scheme with Network Supervision Function in Wireless Network. Xi’an University of Electronic Science and Technology, Xi’an (2017)

    Google Scholar 

  14. Tian, Z., Li, M., Qin, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  15. Tian, Z., Gao, X., Su, S., Qiu, J., Du, X., Guizani, M.: Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans. Veh. Technol. 68(6), 5971–5980 (2019)

    Article  Google Scholar 

  16. Wu, K., Wei, G.: Research on security authentication technology for wireless sensor networks. Commun. Technol. 52(06), 1461–1468 (2019)

    Google Scholar 

  17. Lin, S.: Application and analysis of computer wireless network security technology. Wirel. Interconnect. Technol. 16(10), 13–14 (2019)

    Google Scholar 

  18. Bai, H., Zhang, X.: Wireless network security vulnerabilities and preventive strategies. Electron. Technol. Softw. Eng. 2019(08), 202–207 (2019)

    Google Scholar 

  19. Zhang, Q.: Multi-objective security optimal deployment of wireless sensor network nodes. Electron. Technol. Softw. Eng. 2019(05), 206–210 (2019)

    Google Scholar 

  20. Liu, Z.: Application and analysis of computer wireless network security technology. Netw. Secur. Technol. Appl. 2019(04), 61–62 (2019)

    Google Scholar 

  21. Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Industr. Inf. 15(7), 4285–4294 (2019)

    Article  Google Scholar 

  22. Koh, J.Y., Zhang, P.: Localizing Wireless Jamming Attacks with Minimal Network Resources. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 322–334. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_30

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was supported in part by Guangdong Province Key Research and Development Plan (Grant No. 2019B010137004), the National Key research and Development Plan (Grant No. 2018YFB1800701, No. 2018YFB0803504, and No. 2018YEB1004003), and the The National Natural Science Foundation of China (Grant No. U1636215 and 61572492).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Honghao Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, H. (2019). Research on Security Supervision on Wireless Network Space in Key Sites. In: Wang, G., Bhuiyan, M.Z.A., De Capitani di Vimercati, S., Ren, Y. (eds) Dependability in Sensor, Cloud, and Big Data Systems and Applications. DependSys 2019. Communications in Computer and Information Science, vol 1123. Springer, Singapore. https://doi.org/10.1007/978-981-15-1304-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1304-6_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1303-9

  • Online ISBN: 978-981-15-1304-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics