Font Size: a A A

A Research And Implementation Of Secure WiFi System Based On Visible Light

Posted on:2020-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y PangFull Text:PDF
GTID:2428330596975073Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology,most part of areas of our country have achieved full coverage of WiFi currently.However,due to the openness of the WiFi network,it is vulnerable to various types of attacks,such as sniffing attacks,malicious access point attacks,and so on.Key-sharing is the most typical scenario,in which the attacker captures the indoor WiFi signal outside the room.With the stolen key,he can still gain access to WiFi.Trace its cause,we recognized that the scope of authentication area is far greater than the scope of the actual legitimate users,thus giving the illegal attacker the same opportunity as the legitimate user to access WiFi for identity authentication.We refer to the relevant literature,and found that the characteristic frequency of visible light can be used as a good indicator to indicate whether the user's location is indoor or outdoor.Based on this discovery,we propose a new visible-based indoor WiFi authentication system–VLAuth,which is used to distinguish between legitimate users in the room and illegal users in the outdoor.In this paper,the visible light characteristic frequency is used as the medium to attach the user's geographical location information to the user's network request.After the route captures the network request,the RSSI value and the characteristic frequency are extracted,and the server end performs user identity authentication.On the basis of user access experience free concept and no modification of current WiFi Authentication process,we successfully integrate the visible light characteristic frequency into available authentication protocol.Visible light characteristic frequency is used to mark users as indoor legitimate or outdoor illegitimate due to its uniqueness.We eliminating the dependency of insecure factor of secret key,and reduce the latency of connection process and prevent users from exposing private information to the public,and also improve the user experience.We implement VL-Auth on an off-the-shelf access point,and the result of the experiment demonstrates that the authentication rate for legitimate/illegal users was extremely high,and the connection latency was reduced by approximately 30%.
Keywords/Search Tags:Visible Light Communication, WiFi Authentication, Mobile Smart Device, Characteristic Frequency of Visible Light
PDF Full Text Request
Related items