CN103259878A - MAC address capture method for specific target user of wireless local area network - Google Patents

MAC address capture method for specific target user of wireless local area network Download PDF

Info

Publication number
CN103259878A
CN103259878A CN2013101354422A CN201310135442A CN103259878A CN 103259878 A CN103259878 A CN 103259878A CN 2013101354422 A CN2013101354422 A CN 2013101354422A CN 201310135442 A CN201310135442 A CN 201310135442A CN 103259878 A CN103259878 A CN 103259878A
Authority
CN
China
Prior art keywords
sta
state set
node
list
judgement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101354422A
Other languages
Chinese (zh)
Other versions
CN103259878B (en
Inventor
杨明
舒明雷
郭强
周书旺
付勇
魏诺
刘瑞霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Computer Science Center
Original Assignee
Shandong Computer Science Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Computer Science Center filed Critical Shandong Computer Science Center
Priority to CN201310135442.2A priority Critical patent/CN103259878B/en
Publication of CN103259878A publication Critical patent/CN103259878A/en
Application granted granted Critical
Publication of CN103259878B publication Critical patent/CN103259878B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an MAC address capture method for a specific target user of a wireless local area network. The MAC address capture method comprises the following steps: step a, data are acquired; step b, a state set is established and an RSSI sequence is updated based on a hash table, and the state set is recorded; step c, a topological structure of the WLAN is updated; step d, with the time as a period, a first category of STA state sets with a maximum RSSI statistical average are upgraded and searched; step e, with the time as a period, a second category of STA state sets with the maximum RSSI statistical average are upgraded and searched; step f, an MAC address of the specific target user is determined. The MAC address capture method for the specific target user of the wireless local area network supports various WLAN standards (IEEE802.11 a/b/g/n) at present, can rapidly capture MAC addresses of various WLAN terminal devices used by the specific target user in a traceless and non-intervention mode, and has the advantages of multi-user applicability, network connection applicability, wireless data size applicability, evidence acquisition rapidity and tracelessness.

Description

A kind of catching method of the MAC Address for WLAN (wireless local area network) specific objective user
Technical field
The present invention relates to a kind of WLAN (wireless local area network) evidence collecting method, be particularly related to a kind of in WLAN (wireless local area network), with without vestige, non-intervention mode, the method for the MAC Address of the various WLAN terminal equipments (smart mobile phone, panel computer, notebook computer etc.) that fast Acquisition specific objective user uses.
Background technology
The quickening of following China " wireless city " to build, based on Wi-Fi(Wireless Fidelity, Wireless Fidelity) the WLAN(Wireless Local Area Network of technology, WLAN (wireless local area network)) become one of the most universal wireless network forms, its transmission rate is high, wide coverage, construction cost are low, can make up preferably 3G network and can't meet the problem that data traffic is increased sharply.Yet WLAN is when bringing great convenience for social life, the various illegal acts that utilize WLAN to be engaged in also increase gradually.Therefore, be exclusively used in the evidence collecting method of WLAN, become common problem demanding prompt solution in wireless network research and computer forensics research.
A typical application demand of WLAN evidence obtaining is, for specific targeted customer, and in non-intervention, traceless mode, the MAC(Medium Access Control of its WLAN terminal equipment used of fast Acquisition, media access control) address.This MAC Address is the only sign to the wireless network card in the WLAN terminal equipment, the hexadecimal digit of 6 bytes, consists of, as " 00-A1-B0-BF-05-14 ".
According to IEEE 802.11 standards, the AP(Access Point in WLAN, access points) and the various WLAN terminal equipments that use of user, can be referred to as STA(Station, website); For showing difference, the STA in follow-up statement specially refers to subscriber terminal equipment.Catching the MAC Address of specific objective STA, is the prerequisite and basis of further its illegal network behavior being monitored and being collected evidence.
Current, the method and the technology that are exclusively used in the WLAN evidence obtaining are still few, the system that patent was provided that is typically " 200920222352.6 " (wireless network inspection evidence-obtaining system) as application number, the AP/STA possessed big-and-middle-sized wireless network is scanned, the function of quick obtaining network configuration global information, and can carry out that leak is searched, control of authority and file download; But it can't be applicable to carry out for specific objective the application demand that MAC Address is caught.
Relevant WLAN examination and controlling method mainly is divided into following a few class.
1, status monitoring class.For example application number is the patent that " 03812753.9 " (determining the state in WLAN (wireless local area network)) and application number are " 03812564.1 " (Monitoring a local area network), provide radio frames based on transmitting between one or more STA and AP to monitor the method for WLAN, can set up the full database of AP/STA the state of definite STA, thereby the connectedness of STA is diagnosed.Yet these class methods can't, from a plurality of STA, be distinguished the MAC Address of specific objective and the MAC Address of normal users.
2, safety detection class.The patent that for example application number is " 200810304369.6 " (method of mobile radio station, base station and attack detecting thereof), provide a kind of to cancelling association or cancelling authentication and attack the method detected; The patent that application number is " 200610169954.0 " (method of monitoring illegal access point, equipment and system in WLAN (wireless local area network)), provide a kind of and can in a plurality of channels, prevent the method that validated user and rogue AP connect.Though these class methods are relevant to wlan security and forensic applications, it also is not suitable for for specific objective and carries out the scene that MAC Address is caught.
3, target localization class.For example application number is the patent that " 201010102025.4 " (equipment in wireless local land area location and tracking and device) and application number are " 200910147726.7 " (localization method in a kind of WLAN (wireless local area network) and device), based on the wireless signal strength statistical technique, the method that target STA/AP is positioned is provided respectively in the scene of foundation-free facility and the scene at the corresponding relation database of built vertical signal strength signal intensity and position.Yet the essence of these class methods is in the situation that known specific objective MAC Address is detected its position, the WLAN evidence obtaining scene of just carrying with the present invention is contrary.
In sum, current all kinds of WLAN evidence obtainings and method and technique, and be not suitable for for specific objective and carry out the seamless application demand of catching of MAC Address.
Summary of the invention
The present invention is in order to overcome the shortcoming of above-mentioned technical problem, but the method for the MAC Address of the various WLAN terminal equipments that provide a kind of fast Acquisition specific objective user to use.
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, AP is the access points in WLAN, STA is subscriber terminal equipment, RSSI is the received signal strength index, its special feature is, comprise the following steps successively: a). data acquisition, choose with specific objective STA at a distance of near, with the position of other user's apart from each others, based on scan channel strategy, time threshold strategy and data volume threshold strategies, obtain all kinds of radio frames of transmitting by airlink in WLAN; B). build state set and upgrade the RSSI sequence based on Hash table, establishing set
Figure 2013101354422100002DEST_PATH_IMAGE002
be the set of the state information of a STA or AP, be called " state set ",
Figure 726223DEST_PATH_IMAGE002
be denoted as:
Figure 2013101354422100002DEST_PATH_IMAGE004
Wherein,
Figure 2013101354422100002DEST_PATH_IMAGE006
For the sequence that length is 6 bytes, store the MAC Address of STA/AP; Due to the uniqueness of MAC Address, can by As to this state set
Figure 989812DEST_PATH_IMAGE002
Only sign;
Figure 2013101354422100002DEST_PATH_IMAGE008
For maximum length is
Figure 2013101354422100002DEST_PATH_IMAGE010
Sequence, the storage source MAC of having caught is
Figure 132824DEST_PATH_IMAGE006
The RSSI value of each radio frames, each element is the integer value between-90 to 20, linear module is dBm;
Figure 2013101354422100002DEST_PATH_IMAGE012
The type of presentation-entity,
Figure 2013101354422100002DEST_PATH_IMAGE014
Mean that it is AP,
Figure 2013101354422100002DEST_PATH_IMAGE016
Mean that it is STA,
Figure 2013101354422100002DEST_PATH_IMAGE018
Mean that its type is not yet definite;
Figure 2013101354422100002DEST_PATH_IMAGE020
: only work as Shi Youxiao, store the SSID of this AP;
Figure 2013101354422100002DEST_PATH_IMAGE022
: only work as
Figure 659674DEST_PATH_IMAGE014
Shi Youxiao, store the wireless communication Taoist monastic name of the current use of this AP;
Figure 2013101354422100002DEST_PATH_IMAGE024
: only work as
Figure 51341DEST_PATH_IMAGE014
Shi Youxiao, for each STA child node of this AP of index, is that maximum length is
Figure 2013101354422100002DEST_PATH_IMAGE026
Sequence, each element is respectively the memory address of the corresponding STA state set of each child node;
Figure 2013101354422100002DEST_PATH_IMAGE028
For Boolean type numerical value, indication
Figure 505368DEST_PATH_IMAGE002
Whether each interior status information is complete, when
Figure 361197DEST_PATH_IMAGE014
The time, whether be used to indicate and obtain this AP's
Figure 603829DEST_PATH_IMAGE020
With
Figure 420475DEST_PATH_IMAGE022
Data item; When
Figure 344437DEST_PATH_IMAGE016
The time, be used to indicate and whether the memory address of this STA state set inserted to its father node
Figure 173548DEST_PATH_IMAGE024
Sequence; Each radio frames of a) obtaining for step, based on " MAC Address → state set in Hash table
Figure 790343DEST_PATH_IMAGE002
Memory address " direct mapping, fast finding or build the source MAC of this frame
Figure 2013101354422100002DEST_PATH_IMAGE030
Corresponding state set
Figure 969651DEST_PATH_IMAGE002
, and by the RSSI value of this frame
Figure 2013101354422100002DEST_PATH_IMAGE032
Be updated to sequence
Figure 494042DEST_PATH_IMAGE008
C). upgrade the topological structure of WLAN: according to sign
Figure 137513DEST_PATH_IMAGE028
, determine whether data item relevant to topology in the treatment state collection
Figure 472680DEST_PATH_IMAGE012
, , With
Figure 214611DEST_PATH_IMAGE024
, according to frame type and subframe type, the incidence relation between decision state collection type and STA/AP, build and upgrade based on " the AP chained list+
Figure 923941DEST_PATH_IMAGE024
Sequence " the WLAN topological structure; The AP chained list is a linear linked list, can carry out index to the AP state set in Hash table, and in the AP chained list, the structure of each node is:
Figure 2013101354422100002DEST_PATH_IMAGE034
D). with the time
Figure 2013101354422100002DEST_PATH_IMAGE036
for the cycle, the WLAN topological structure is traveled through, utilize AP state set and first kind STA state set in the WLAN topological structure, upgrade the node data in existing topological tree list, and search, mark RSSI average statistical
Figure 2013101354422100002DEST_PATH_IMAGE038
maximum STA; First kind STA state set is
Figure 67390DEST_PATH_IMAGE016
and state set; The topological tree list is the form that adopts tree-shaped hierarchical lists, to the output display result of each AP state set in the WLAN topological structure and first kind STA state set;
Figure 901678DEST_PATH_IMAGE038
to sequence
Figure 191845DEST_PATH_IMAGE008
the average statistical of interior all elements; E). with the time
Figure 2013101354422100002DEST_PATH_IMAGE042
for the cycle, the Equations of The Second Kind STA state set in Hash table is traveled through, utilize Equations of The Second Kind STA state set, upgrade the node data in existing not associated list, and search, mark RSSI average statistical maximum STA; Equations of The Second Kind STA state set is and
Figure 2013101354422100002DEST_PATH_IMAGE046
state set; Not associated list is the form that adopts the individual layer list, to the output display result of each Equations of The Second Kind STA state set; F). judge specific objective user's MAC Address, work as steps d) in described topological tree list and step e) institute's mark in described not associated list
Figure 699891DEST_PATH_IMAGE038
when maximum STA node all keeps stablizing, compare the RSSI average statistical of STA in two steps, have larger among both
Figure 120508DEST_PATH_IMAGE038
the corresponding MAC Address of STA node, be specific objective user's MAC Address.
AP is Access Point; STA is Station, specially refers to subscriber terminal equipment here; RSSI is Received Signal Strength Indicator, is a kind of energy norm index to received WLAN wireless signal, and the measured RSSI about certain STA will reduce with the increase of distance between measurement point and this STA; Step a) in, choose with specific objective STA at a distance of near, catch radio frames with the position of other user's apart from each others, therefore there is the corresponding MAC Address of the STA of maximum RSSI average statistical, be specific objective user's MAC Address.Step b) in, by each STA/AP state set
Figure 780028DEST_PATH_IMAGE002
as a record, with
Figure 80428DEST_PATH_IMAGE006
as the keyword of this record, build the Hash table about each STA/AP state set in range of receiving, therefore can realize the direct mapping to the memory location of institute's corresponding states collection in Hash table by the radio frames source MAC.Step c), in, the AP chained list can carry out index to the AP state set, in the AP state set
Figure 5659DEST_PATH_IMAGE024
sequence can be carried out index to its each STA child node, therefore can the Hash table larger at degree of rarefication in, for occurred STA/AP state set builds index fast and effectively.Steps d) and step e) two class STA state sets are adopted to diverse ways, respectively periodically statistics with upgrade the STA state set with maximum RSSI average statistical.Step f) STA with Global maximum RSSI average statistical can be judged to be to the specific objective user, thereby obtain its MAC Address.
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, arrange sign
Figure 2013101354422100002DEST_PATH_IMAGE048
if,
Figure 2013101354422100002DEST_PATH_IMAGE050
, mean to start successively all channels to be scanned from first available channel, if
Figure 2013101354422100002DEST_PATH_IMAGE052
, mean particular channel is scanned; It is characterized in that, step a) described data acquisition comprises the following steps: a-1). judgement scan channel strategy, judgement
Figure 660326DEST_PATH_IMAGE048
value, if
Figure 95724DEST_PATH_IMAGE050
, channel to be scanned is set to the first channel in whole available channels; If
Figure 380075DEST_PATH_IMAGE052
, channel to be scanned is set to input value
Figure 2013101354422100002DEST_PATH_IMAGE054
corresponding channel; A-2). mode of operation is set to RF Monitor Mode; Under this pattern, can be caught all radio frames of each STA/AP transmission in current scanning channel; A-3). catch radio frames and carry out verification, catch a radio frames and carry out CRC check, if incorrect through CRC check, this frame being abandoned and radio frames of recapture; If CRC check is correct, this frame is kept in to buffering area to execution step a-4); A-4). the judgement of capture time threshold value, whether the time that radio frames is caught in judgement reaches the capture time threshold value
Figure 2013101354422100002DEST_PATH_IMAGE056
if reach
Figure 41869DEST_PATH_IMAGE056
, perform step a-6); If do not reach , perform step a-5); A-5). the judgement of capture-data amount threshold value, whether the data volume that radio frames is caught in judgement reaches capture-data amount threshold value if reach , perform step a-6); If do not reach
Figure 319420DEST_PATH_IMAGE058
, perform step a-3); A-6). submit data to, the wireless frame data be temporarily stored in buffering area is carried out to the batch submission, execution step a-7); A-7). judgement
Figure 156926DEST_PATH_IMAGE048
, judgement
Figure 723036DEST_PATH_IMAGE048
value, if , monitor next available channel; If , again current channel is monitored; Execution step a-3).
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, step b) described build state set and upgrade the RSSI sequence based on Hash table comprise the following steps: b-1). read radio frames and judge its type; Read a radio frames the batch data of a) submitting to from step, and judge whether it is CTS or the ACK subframe in control frame, and CTS or ACK subframe, re-execute step b-1 if); If, neither the CTS subframe neither the ACK subframe, obtain the source MAC of this frame
Figure 959348DEST_PATH_IMAGE030
and strength signal
Figure 266833DEST_PATH_IMAGE032
; Here the abbreviation that CTS is Clear To Send, be the clear to send (CTS) subframe, and the abbreviation that ACK is Acknowledge, for confirming subframe, does not all contain the MAC Address of source in these two kinds of subframes; B-2). with
Figure 157429DEST_PATH_IMAGE030
rear two bytes calculate Hash addresses corresponding to source MAC
Figure 2013101354422100002DEST_PATH_IMAGE060
, and judge whether the record at this place, Hash address is empty, and sky performs step b-3 if); If be not empty, perform step b-4); B-3). in the Hash address
Figure 79117DEST_PATH_IMAGE060
locate newly-built state set
Figure 2013101354422100002DEST_PATH_IMAGE062
, and to state set
Figure 874904DEST_PATH_IMAGE062
carry out initialization, will
Figure 48396DEST_PATH_IMAGE062
as
Figure 996761DEST_PATH_IMAGE030
corresponding state set, execution step b-7);
By
Figure 964717DEST_PATH_IMAGE030
the hash function that is mapped to the Hash address can be expressed as:
Figure 2013101354422100002DEST_PATH_IMAGE064
Identical and cause all state sets of Hash table conflict for two bytes after MAC Address, all be stored in same linear linked list; B-4). judge whether to exist the Hash table conflict, by the Hash address The state set at place is denoted as
Figure 914665DEST_PATH_IMAGE002
, judgement
Figure 2013101354422100002DEST_PATH_IMAGE066
Whether set up, if set up, will
Figure 779852DEST_PATH_IMAGE002
Be denoted as
Figure 105660DEST_PATH_IMAGE062
, as
Figure 689088DEST_PATH_IMAGE030
Corresponding state set, execution step b-7); If be false, perform step b-5); B-5). traversal conflict chained list, with
Figure 876487DEST_PATH_IMAGE060
The state set at place is the linked list head node, and traversal reads the state set in chained list node , search and whether exist
Figure 358470DEST_PATH_IMAGE066
State set, if any the state set that satisfies condition, exist, will
Figure 429194DEST_PATH_IMAGE002
Be denoted as
Figure 420284DEST_PATH_IMAGE062
, as Corresponding state set, execution step b-7); If traveled through the conflict chained list, the state set all do not satisfied condition, perform step b-6); B-6). newly-built state set, newly-built state set
Figure 865358DEST_PATH_IMAGE062
And it is added into to the end of existing conflict chained list, and to state set
Figure 157799DEST_PATH_IMAGE062
Initialized, will
Figure 14896DEST_PATH_IMAGE062
As
Figure 896134DEST_PATH_IMAGE030
Corresponding state set, execution step b-7); B-7). whether the sequence that judges storage signal intensity is full, with Mean state set
Figure 547695DEST_PATH_IMAGE062
In
Figure 2013101354422100002DEST_PATH_IMAGE070
The length of the current actual storage data of sequence,
Figure 530694DEST_PATH_IMAGE010
For its maximum length,
Figure 112854DEST_PATH_IMAGE010
For even number; Judgement Whether set up, if set up, by this frame
Figure 661647DEST_PATH_IMAGE032
The value insetion sequence
Figure 687372DEST_PATH_IMAGE070
End, deposit in
Figure 2013101354422100002DEST_PATH_IMAGE074
Among; If be false, show
Figure 79039DEST_PATH_IMAGE068
Reached the sequence maximum length , perform step b-8); B-8). discharge segment space the storage of sequence , with
Figure 2013101354422100002DEST_PATH_IMAGE076
Mean former sequence,
Figure 64816DEST_PATH_IMAGE070
Sequence after meaning to upgrade; Will
Figure 819145DEST_PATH_IMAGE076
The average conduct of first half segment data
Figure 2013101354422100002DEST_PATH_IMAGE078
Value, will
Figure 686650DEST_PATH_IMAGE076
The second half section data move to
Figure 2013101354422100002DEST_PATH_IMAGE080
, and by this frame
Figure 210035DEST_PATH_IMAGE032
Insert
Figure 2013101354422100002DEST_PATH_IMAGE082
Among.
MAC Address for WLAN specific objective user catching method of the present invention, the target MAC (Media Access Control) address of establishing caught radio frames is
Figure 2013101354422100002DEST_PATH_IMAGE084
, For target MAC (Media Access Control) address
Figure 764513DEST_PATH_IMAGE084
Corresponding state set; Source MAC is
Figure 740560DEST_PATH_IMAGE030
,
Figure 405896DEST_PATH_IMAGE062
For source MAC
Figure 236318DEST_PATH_IMAGE030
Corresponding state set; Step c) topological structure of described renewal WLAN comprises the following steps: c-1). the type of judgement radio frames, for step b-1) radio frames that reads, if management frames performs step c-2), if control frame performs step c-3), if Frame performs step c-4); C-2). the subtype of judgement management frames, if probe requests thereby performs step c-2-1), if beacon performs step c-2-2), if probe response performs step c-2-3), if associated response or again associated response perform step c-2-4), if associated request or again associated request perform step c-2-5); C-2-1). judgement Whether set up, if set up, order
Figure 2013101354422100002DEST_PATH_IMAGE090
, return to step b-1); If be false, return to step b-1); C-2-2). judgement
Figure 2013101354422100002DEST_PATH_IMAGE092
Whether set up, if set up, return to step b-1); If be false, perform step c-2-2-1); C-2-2-1). judgement
Figure 509167DEST_PATH_IMAGE088
Whether set up, if set up, arrange
Figure 2013101354422100002DEST_PATH_IMAGE094
, and will
Figure 425040DEST_PATH_IMAGE062
Memory address insert the end of AP chained list, execution step c-2-2-2); If be false, perform step c-2-2-2); C-2-2-2). according to the frame content obtaining
Figure 2013101354422100002DEST_PATH_IMAGE096
With
Figure 2013101354422100002DEST_PATH_IMAGE098
Value, and arrange
Figure 441537DEST_PATH_IMAGE092
, return to step b-1); C-2-3). judgement
Figure 126465DEST_PATH_IMAGE092
Whether set up, if set up, execution step c-2-3-3); If be false, perform step c-2-3-1); C-2-3-1). judgement
Figure 632533DEST_PATH_IMAGE088
Whether set up, if be false, perform step c-2-3-2); If set up, first arrange
Figure 848751DEST_PATH_IMAGE094
, and will Memory address insert the end of AP chained list, then perform step c-2-3-2); C-2-3-2). according to the frame content obtaining
Figure 21423DEST_PATH_IMAGE096
With
Figure 88605DEST_PATH_IMAGE098
Value, and arrange , execution step c-2-3-3); C-2-3-3). search target MAC (Media Access Control) address based on Hash table
Figure 947157DEST_PATH_IMAGE084
Corresponding state set , and the judgement state set
Figure 454547DEST_PATH_IMAGE086
In
Figure 2013101354422100002DEST_PATH_IMAGE100
Whether set up, if set up, arrange , return to step b-1); If be false, return to step b-1); C-2-4). judgement Whether set up, if be false, perform step c-2-4-1); If set up, arrange
Figure 722860DEST_PATH_IMAGE094
, and will
Figure 49936DEST_PATH_IMAGE062
Memory address insert the end of AP chained list, then perform step c-2-4-1); C-2-4-1). search target MAC (Media Access Control) address based on Hash table
Figure 271970DEST_PATH_IMAGE084
Corresponding state set
Figure 871448DEST_PATH_IMAGE086
, and the judgement state set
Figure 633868DEST_PATH_IMAGE086
In
Figure 753133DEST_PATH_IMAGE100
Whether set up, if set up, arrange
Figure 208385DEST_PATH_IMAGE102
, return to step b-1); If be false, return to step b-1); C-2-5). judgement
Figure 108208DEST_PATH_IMAGE088
Whether set up, if be false, perform step c-2-5-1); If set up, first arrange , then perform step c-2-5-1); C-2-5-1). search target MAC (Media Access Control) address based on Hash table
Figure 835042DEST_PATH_IMAGE084
Corresponding state set , and judgement
Figure 2013101354422100002DEST_PATH_IMAGE104
Whether set up, if set up, return to step b-1); If be false, perform step c-2-5-2); C-2-5-2). judgement
Figure 35265DEST_PATH_IMAGE100
Whether set up, if be false, perform step c-2-5-3); If set up, arrange
Figure 2013101354422100002DEST_PATH_IMAGE106
, and will
Figure 77170DEST_PATH_IMAGE086
Memory address insert the end of AP chained list, then perform step c-2-5-3); C-2-5-3). judgement
Figure 2013101354422100002DEST_PATH_IMAGE108
Content be whether empty, if be sky, directly return to step b-1); Empty if,, according to the frame content, obtain
Figure 420296DEST_PATH_IMAGE108
Value, then return to step b-1); C-3). the subtype of judgement control frame, if energy-conservation poll is searched target MAC (Media Access Control) address based on Hash table Corresponding state set
Figure 763869DEST_PATH_IMAGE086
, execution step c-3-1); If other subtype, return to step b-1); C-3-1). judgement
Figure 937362DEST_PATH_IMAGE092
Whether set up, if set up, perform step c-3-4); If be false, perform step c-3-2); C-3-2). judgement
Figure 948043DEST_PATH_IMAGE088
Whether set up, if be false, perform step c-3-3); If set up, first arrange
Figure 102950DEST_PATH_IMAGE090
, then perform step c-3-3); C-3-3). will Memory address insert its father node In
Figure 2013101354422100002DEST_PATH_IMAGE110
The end of sequence, and sequence
Figure 2013101354422100002DEST_PATH_IMAGE112
Length Increase by 1; And arrange , execution step c-3-4); C-3-4). judgement Whether set up, if be false, return to step b-1); If set up, arrange
Figure 750356DEST_PATH_IMAGE106
, and will
Figure 72DEST_PATH_IMAGE086
Memory address insert the end of AP chained list, return to step b-1); C-4). based on Hash table, search target MAC (Media Access Control) address Corresponding state set
Figure 232787DEST_PATH_IMAGE086
The transmission direction of judgement Frame, if uplink frame performs step c-4-1); If it performs step c-4-2 for downlink frame); C-4-1). judgement
Figure 303511DEST_PATH_IMAGE092
Whether set up, if set up, perform step c-4-1-3); If be false, perform step c-4-1-1); C-4-1-1). judgement Whether set up, if be false, perform step c-4-1-2); If set up, first arrange
Figure 401227DEST_PATH_IMAGE090
, then perform step c-4-1-2); C-4-1-2). will
Figure 819570DEST_PATH_IMAGE062
Memory address insert its father node
Figure 112011DEST_PATH_IMAGE086
In
Figure 93742DEST_PATH_IMAGE110
The end of sequence, and sequence
Figure 37296DEST_PATH_IMAGE112
Length
Figure 62759DEST_PATH_IMAGE114
Increase by 1; Arrange , execution step c-4-1-3); C-4-1-3). judgement
Figure 503285DEST_PATH_IMAGE100
Whether set up, if be false, return to step b-1); If set up, arrange
Figure 239028DEST_PATH_IMAGE106
, and will
Figure 264753DEST_PATH_IMAGE086
Memory address insert the end of AP chained list, return to step b-1); C-4-2). judgement
Figure 531787DEST_PATH_IMAGE088
Whether set up, if be false, perform step c-4-2-1); If set up, arrange
Figure 595601DEST_PATH_IMAGE094
, and will
Figure 451430DEST_PATH_IMAGE062
Memory address insert the end of AP chained list, execution step c-4-2-1); C-4-2-1). judgement Whether set up, if set up, return to step b-1); If be false, perform step c-4-2-2); C-4-2-2). judgement
Figure 136806DEST_PATH_IMAGE100
Whether set up, if be false, perform step c-4-2-3); If set up, first arrange
Figure 139397DEST_PATH_IMAGE102
, then perform step c-4-2-3); C-4-2-3). will Memory address insert its father node
Figure 13998DEST_PATH_IMAGE062
In
Figure 193307DEST_PATH_IMAGE110
The end of sequence, and sequence
Figure 2013101354422100002DEST_PATH_IMAGE116
Length Increase by 1; Arrange
Figure 361169DEST_PATH_IMAGE104
, return to step b-1).
MAC Address for WLAN specific objective user catching method of the present invention, establish
Figure 2013101354422100002DEST_PATH_IMAGE118
For the label of AP chained list interior nodes,
Figure 2013101354422100002DEST_PATH_IMAGE120
For in the AP chained list
Figure 148865DEST_PATH_IMAGE118
The AP state set of individual node institute index,
Figure 2013101354422100002DEST_PATH_IMAGE122
For
Figure 2013101354422100002DEST_PATH_IMAGE124
The label of sequence interior element,
Figure 2013101354422100002DEST_PATH_IMAGE126
For
Figure 549891DEST_PATH_IMAGE124
In sequence the
Figure 18918DEST_PATH_IMAGE122
The STA state set of individual element institute index,
Figure 2013101354422100002DEST_PATH_IMAGE128
Maximum average statistical for signal strength signal intensity RSSI; In the topological tree list, each AP state set is positioned at father node list layer, each first kind STA state set is positioned at the child node list layer under corresponding A P, the data item that the AP node shows is MAC Address, channel number, SSID, RSSI average statistical and the sum of catching radio frames, and the data item that the STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; The processing that state set in the described WLAN of the utilization topological structure of step d) is periodically updated the topological tree list, comprise the following steps: d-1). obtain the AP node sum in existing topological tree list
Figure 2013101354422100002DEST_PATH_IMAGE130
D-2). initial value is set, and the position of reading of AP chained list is set to the linked list head node, and the AP nodal scheme is set
Figure 641530DEST_PATH_IMAGE118
Initial value be " 0 ", the maximum average statistical of RSSI
Figure 453322DEST_PATH_IMAGE128
Initial value be-90, the execution step d-3); D-3). whether the judgement traversal completes, and judges whether the AP chained list has traveled through, if complete, performs step d-16); If do not traveled through, performed step d-4); D-4). a node is read in the pre-treatment position of working as at the AP chained list, and arranges
Figure 2013101354422100002DEST_PATH_IMAGE132
Obtain the AP state set MAC Address, channel number, SSID and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step d-5 based on singular point filtering and average value processing method); D-5). compare label
Figure 489728DEST_PATH_IMAGE118
With AP node sum
Figure 278431DEST_PATH_IMAGE130
, judgement
Figure 2013101354422100002DEST_PATH_IMAGE134
Whether set up, if set up, execution step d-6); If be false, perform step d-7); D-6). compare the AP state set
Figure 893083DEST_PATH_IMAGE120
With in the topological tree list
Figure 331017DEST_PATH_IMAGE118
The corresponding data item of individual AP node, upgraded for inconsistent data item; And obtain topological tree list
Figure 328798DEST_PATH_IMAGE118
The child node sum of individual AP node
Figure 2013101354422100002DEST_PATH_IMAGE136
, execution step d-8); D-7). utilize
Figure 227134DEST_PATH_IMAGE120
Build new node, add the end of AP list in existing topological tree list, execution step d-8); D-8). initialize
Figure 776801DEST_PATH_IMAGE122
, will
Figure 31195DEST_PATH_IMAGE124
The element numerals of sequence
Figure 255503DEST_PATH_IMAGE122
Be set to " 1 ", execution step d-9); D-9). the judgement sequence
Figure 582579DEST_PATH_IMAGE124
In all elements whether read completely, if read completely, perform step d-3); If do not read completely, perform step d-10); D-10). read sequence
Figure 53880DEST_PATH_IMAGE124
Figure 325462DEST_PATH_IMAGE122
Individual element, obtain the STA state set
Figure 602728DEST_PATH_IMAGE126
MAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI based on singular point filtering and average value processing method
Figure 2013101354422100002DEST_PATH_IMAGE138
, execution step d-11); D-11). signal strength signal intensity relatively, compares
Figure 784311DEST_PATH_IMAGE138
With
Figure 557007DEST_PATH_IMAGE128
Size, if
Figure 2013101354422100002DEST_PATH_IMAGE140
, perform step d-12); If
Figure 2013101354422100002DEST_PATH_IMAGE142
, with
Figure 2013101354422100002DEST_PATH_IMAGE144
With
Figure 2013101354422100002DEST_PATH_IMAGE146
Record
Figure 955365DEST_PATH_IMAGE118
With Value, and arrange
Figure 2013101354422100002DEST_PATH_IMAGE148
, execution step d-12); D-12). judgement
Figure 682198DEST_PATH_IMAGE134
Whether set up, if set up, execution step d-13); If be false, perform step d-14); D-13). judgement
Figure 2013101354422100002DEST_PATH_IMAGE150
Whether set up, if set up, compare
Figure 495302DEST_PATH_IMAGE126
With topological tree list
Figure 616842DEST_PATH_IMAGE118
Of individual AP node
Figure 105418DEST_PATH_IMAGE122
The corresponding data item of individual child node, and inconsistent data item is upgraded to execution step d-15); If be false, perform step d-14); D-14). utilize
Figure 199276DEST_PATH_IMAGE126
Build new node, add topological tree list the
Figure 996331DEST_PATH_IMAGE118
The end of the child node list of individual AP node, execution step d-15); D-15). arrange
Figure 2013101354422100002DEST_PATH_IMAGE152
, redirect execution step d-9); D-16). in the topological tree list the Under individual AP node
Figure 886981DEST_PATH_IMAGE146
Individual STA node, be this
Figure 84613DEST_PATH_IMAGE036
There is the first kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, establish
Figure 177203DEST_PATH_IMAGE122
for the label of the Equations of The Second Kind STA state set that finds in Hash table,
Figure 2013101354422100002DEST_PATH_IMAGE154
maximum average statistical for signal strength signal intensity RSSI; In not associated list, the data item that each STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; The described processing that utilizes the Equations of The Second Kind STA state set in Hash table to be periodically updated not associated list of step e), comprise the following steps: e-1). obtain the STA node sum in existing not associated list ; To read position and be made as the original position of Hash table; Label
Figure 2013101354422100002DEST_PATH_IMAGE156
, maximum RSSI average statistical ; E-2). whether judgement comprises the conflict chained list and has traveled through at interior Hash table, if complete, performs step e-7); If do not traveled through, performed step e-3); E-3). a state set is read in the pre-treatment position of working as at Hash table , judge whether this state set meets
Figure 302657DEST_PATH_IMAGE046
and
Figure 441514DEST_PATH_IMAGE044
condition, if do not meet, it does not belong to Equations of The Second Kind STA state set, redirect execution step e-2); If meet, perform step e-4); E-4). arrange
Figure 759363DEST_PATH_IMAGE152
; Obtain the STA state set
Figure 716735DEST_PATH_IMAGE126
mAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step e-5 based on singular point filtering and average value processing method); E-5). signal strength signal intensity relatively, compares
Figure 702009DEST_PATH_IMAGE138
with
Figure 949451DEST_PATH_IMAGE154
size, if
Figure 2013101354422100002DEST_PATH_IMAGE160
, perform step e-6); If
Figure 2013101354422100002DEST_PATH_IMAGE162
, with
Figure 190814DEST_PATH_IMAGE146
record
Figure 244220DEST_PATH_IMAGE122
value, and arrange
Figure 2013101354422100002DEST_PATH_IMAGE164
, execution step e-6); E-6). judgement
Figure 21684DEST_PATH_IMAGE150
whether set up, if set up, compare
Figure 502344DEST_PATH_IMAGE126
with not associated list
Figure 184998DEST_PATH_IMAGE122
the corresponding data item of individual STA node, and inconsistent data item is upgraded to execution step e-2); If be false, utilize
Figure 963467DEST_PATH_IMAGE126
build new node, add the end of existing not associated list, execution step e-2); E-7). judgement
Figure 861015DEST_PATH_IMAGE150
whether set up, if be false, perform step e-8); If set up, the existing not associated list end of deletion
Figure 2013101354422100002DEST_PATH_IMAGE166
individual STA node, execution step e-8); After Hash table has traveled through, here
Figure 717106DEST_PATH_IMAGE122
recorded the sum of the Equations of The Second Kind STA state set found; E-8). of not associated list
Figure 621476DEST_PATH_IMAGE146
individual STA node, be this there is the Equations of The Second Kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, establish for the STA node of institute's mark in the STA node of institute's mark in the topological tree list and not associated list all keeps the stable time, when any in both changes, all reset to 0; The described processing that the specific objective user's MAC address is judged of step f), comprise the following steps: f-1). judge stabilization time
Figure 715837DEST_PATH_IMAGE168
whether reach threshold value
Figure 2013101354422100002DEST_PATH_IMAGE170
if reach
Figure 232138DEST_PATH_IMAGE170
, perform step f-2); If do not reach, random wait performs step f-1 again after a period of time); F-2). relatively
Figure 617989DEST_PATH_IMAGE128
with
Figure 286868DEST_PATH_IMAGE154
the size of value, if
Figure 2013101354422100002DEST_PATH_IMAGE172
, by the STA node determination of institute's mark in the topological tree list, be specific objective, return to its MAC Address; If
Figure 2013101354422100002DEST_PATH_IMAGE174
, by the STA node determination of institute's mark in not associated list, be specific objective, return to its MAC Address.
The invention has the beneficial effects as follows: support current various wlan standards (IEEE 802.11 a/b/g/n), can be in WLAN the MAC Address of fast Acquisition specific objective STA, effectively detect and collect evidence with the unlawful activities in WLAN, and guaranteeing seamlessization of evidence obtaining work.
Advantage with following four aspects:
1, multi-user's applicability.Be that the method can be in the situation that exist a plurality of users simultaneously in WLAN, the MAC of specific objective STA and normal users STA accurately differentiated to the analyzing and processing based on to the WLAN global information, only MAC Address of catching specific objective STA.
2, network-in-dialing applicability.Be that the method both had been applicable to the situation that specific objective STA has connected WLAN, be applicable to again that specific objective STA not yet accesses any WLAN(but its WLAN function is opened) situation.The former can obtain the MAC Address of specific objective STA, channel used and connect the complete information of AP; The latter at least can obtain the MAC Address of specific objective STA self.
3, wireless data amount applicability.Be the method both be applicable to WLAN in high load capacity, transmit the more situation of wireless data, be applicable to again WLAN in underload, transmit the less situation of wireless data.The former possesses the function of carrying out fast processing for mass data; The latter possesses the function of carrying out " doing the best " extraction of information based on finite data.
4, evidence obtaining rapidity and seamless property.Be the method at short notice (tolerance interval is 30 ~ 60 seconds) complete fast the catching of specific objective MAC Address, and need not in WLAN, detect long-time; On the other hand, the method is lower to the requirement of hardware configuration, can realize in portable handheld device, to accomplish seamlessization of evidence obtaining.
The accompanying drawing explanation
The theory diagram that Fig. 1 is MAC Address catching method of the present invention;
The flow chart that Fig. 2 is WLAN data capture method in the present invention;
Fig. 3 is that in the present invention, the state set based on Hash table builds the flow chart with RSSI sequence update method;
The flow chart that Fig. 4 is the WLAN topological structure update method based on management frames in the present invention;
The flow chart that Fig. 5 is the WLAN topological structure update method based on control frame in the present invention;
The flow chart of the WLAN topological structure update method that Fig. 6 is based on data frame in the present invention;
Fig. 7 utilizes the state set in the WLAN topological structure topological tree list to be carried out to the flow chart of periodical update method.
Fig. 8 utilizes the Equations of The Second Kind STA state set in Hash table not associated list to be carried out to the flow chart of periodical update method.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the invention will be further described.
As shown in Figure 1, provided the theory diagram of MAC Address catching method of the present invention, processed two parts by data acquisition and data and form." data acquisition " module can be monitored under mode of operation at radio frequency according to selected scan channel strategy, catches all kinds of IEEE 802.11 radio frames; After CRC check, based on specific time threshold strategy and data volume threshold strategies, the data of obtaining are committed to data processing module." data processing " part comprises three submodules: (1) state set builds with the RSSI sequence and upgrades submodule, can realize based on Hash table the direct mapping of " MAC Address → state set memory address ", for each radio frames, fast finding or create the corresponding state set of its source, be updated to the RSSI sequence in state set fast by its RSSI value; And can carry out the hash-collision processing based on the chain address approach.(2) the WLAN topological structure upgrades submodule, can based on " the AP chained list+
Figure 342548DEST_PATH_IMAGE024
sequence " be that occurred STA/AP state set builds index structure fast and effectively; and the complete sign of state-based collection; determine the strategy that data item relevant to topology in state set is processed; thereby according to different frame types and subframe type, the incidence relation between decision state collection type and STA/AP.(3) MAC Address is caught periodic statistics, the output of result and is upgraded submodule, can to the RSSI sequence of each state set, be added up based on singular value filtering and average value processing; Can adopt AP state set and first kind STA state set in tree-shaped hierarchical lists output WLAN topological structure, with
Figure 283829DEST_PATH_IMAGE036
for the node data of cycle renewal topological tree list, and mark has the STA of maximum RSSI average statistical; Can adopt the Equations of The Second Kind STA state set in not associated list output Hash table, with for the cycle is upgraded node data, and mark has the STA of maximum RSSI average statistical; Through some update cycles, the RSSI the maximum in topological tree list and not associated list, be confirmed as the specific objective user.
MAC Address for WLAN (wireless local area network) specific objective user catching method of the present invention, AP is the access points in WLAN, and STA is subscriber terminal equipment, and RSSI is the received signal strength index, comprises the following steps successively:
A). data acquisition, choose with specific objective STA at a distance of near, with the position of other user's apart from each others, based on scan channel strategy, time threshold strategy and data volume threshold strategies, obtain all kinds of radio frames of transmitting by airlink in WLAN;
As shown in Figure 2, provided the flow chart of WLAN data capture method, sign has been set
Figure 940298DEST_PATH_IMAGE048
if,
Figure 104563DEST_PATH_IMAGE050
, mean to start successively all channels to be scanned from first available channel, if
Figure 346189DEST_PATH_IMAGE052
, mean particular channel is scanned; It can adopt following steps to realize:
A-1). judgement scan channel strategy, judgement
Figure 824574DEST_PATH_IMAGE048
value, if
Figure 202466DEST_PATH_IMAGE050
, channel to be scanned is set to the first channel in whole available channels; If
Figure 990162DEST_PATH_IMAGE052
, channel to be scanned is set to input value
Figure 453505DEST_PATH_IMAGE054
corresponding channel;
A-2). mode of operation is set to RF Monitor Mode; Under this pattern, can be caught all radio frames of each STA/AP transmission in current scanning channel;
A-3). catch radio frames and carry out verification, catch a radio frames and carry out CRC check, if incorrect through CRC check, this frame being abandoned and radio frames of recapture; If CRC check is correct, this frame is kept in to buffering area to execution step a-4);
A-4). the judgement of capture time threshold value, whether the time that radio frames is caught in judgement reaches the capture time threshold value
Figure 860215DEST_PATH_IMAGE056
if reach
Figure 279564DEST_PATH_IMAGE056
, perform step a-6); If do not reach
Figure 51211DEST_PATH_IMAGE056
, perform step a-5);
A-5). the judgement of capture-data amount threshold value, whether the data volume that radio frames is caught in judgement reaches capture-data amount threshold value
Figure 1850DEST_PATH_IMAGE058
if reach
Figure 822038DEST_PATH_IMAGE058
, perform step a-6); If do not reach
Figure 174522DEST_PATH_IMAGE058
, perform step a-3);
A-6). submit data to, the wireless frame data be temporarily stored in buffering area is carried out to the batch submission, execution step a-7);
A-7). judgement , judgement
Figure 741956DEST_PATH_IMAGE048
value, if , monitor next available channel; If
Figure 572825DEST_PATH_IMAGE052
, again current channel is monitored; Execution step a-3).
B). build state set and upgrade the RSSI sequence based on Hash table, establishing set
Figure 810909DEST_PATH_IMAGE002
be the set of the state information of a STA or AP, be called " state set ",
Figure 923090DEST_PATH_IMAGE002
be denoted as:
Figure 85081DEST_PATH_IMAGE004
Wherein,
Figure 412157DEST_PATH_IMAGE006
for the length sequence that is 6 bytes, the MAC Address of storage STA/AP, as
Figure DEST_PATH_IMAGE176
; Due to the uniqueness of MAC Address, can by
Figure 617880DEST_PATH_IMAGE006
as to this state set
Figure 149181DEST_PATH_IMAGE002
only sign;
Figure 177180DEST_PATH_IMAGE008
for maximum length is
Figure 296445DEST_PATH_IMAGE010
sequence, the storage source MAC of having caught is
Figure 751697DEST_PATH_IMAGE006
the RSSI value of each radio frames, each element is the integer value between-90 to 20, linear module is dBm; the type of presentation-entity, mean that it is AP, mean that it is STA,
Figure 4507DEST_PATH_IMAGE018
mean that its type is not yet definite;
Figure 126047DEST_PATH_IMAGE020
: only work as
Figure 682799DEST_PATH_IMAGE014
shi Youxiao, store the SSID of this AP; The abbreviation that SSID is Service Set Identifier is service set;
Figure 838974DEST_PATH_IMAGE022
: only work as
Figure 636029DEST_PATH_IMAGE014
shi Youxiao, store the wireless communication Taoist monastic name of the current use of this AP;
Figure 182548DEST_PATH_IMAGE024
: only work as
Figure 277411DEST_PATH_IMAGE014
shi Youxiao, for each STA child node of this AP of index, is that maximum length is
Figure 288093DEST_PATH_IMAGE026
sequence, each element is respectively the memory address of the corresponding STA state set of each child node;
Figure 193732DEST_PATH_IMAGE028
for Boolean type numerical value, value is 0 or 1, indication whether each interior state information is complete, when
Figure 188419DEST_PATH_IMAGE014
the time, whether be used to indicate and obtain this AP's
Figure 991290DEST_PATH_IMAGE020
with
Figure 130147DEST_PATH_IMAGE022
data item; When
Figure 149793DEST_PATH_IMAGE016
the time, be used to indicate and whether the memory address of this STA state set inserted to its father node
Figure 602771DEST_PATH_IMAGE024
sequence;
Each radio frames captured in a) for step, based on " MAC Address → state set in Hash table
Figure 322466DEST_PATH_IMAGE002
memory address " direct mapping, fast finding or build the source MAC of this frame
Figure 632224DEST_PATH_IMAGE030
corresponding state set
Figure 895758DEST_PATH_IMAGE062
, and by the RSSI value of this frame
Figure 886848DEST_PATH_IMAGE032
be updated to sequence
Figure 726628DEST_PATH_IMAGE070
;
As shown in Figure 3, provided the state set based on Hash table in the present invention and built the flow chart with RSSI sequence update method, it can adopt following steps to realize:
B-1). read radio frames and judge its type; Read a radio frames the batch data of a) submitting to from step, and judge whether it is CTS or the ACK subframe in control frame, and CTS or ACK subframe, re-execute step b-1 if); If neither also non-ACK subframe of CTS subframe, obtain the source MAC of this frame
Figure 207288DEST_PATH_IMAGE030
and strength signal
Figure 201527DEST_PATH_IMAGE032
; Here the abbreviation that CTS is Clear To Send, be the clear to send (CTS) subframe, and the abbreviation that ACK is Acknowledge, for confirming subframe, does not all contain the MAC Address of source in these two kinds of subframes;
B-2). with rear two bytes calculate Hash addresses corresponding to source MAC
Figure 425015DEST_PATH_IMAGE060
, and judge whether the record at this place, Hash address is empty, and sky performs step b-3 if); If be not empty, perform step b-4);
B-3). in the Hash address
Figure 529106DEST_PATH_IMAGE060
locate newly-built state set , and to state set
Figure 781018DEST_PATH_IMAGE062
carry out initialization, will
Figure 595390DEST_PATH_IMAGE062
as corresponding state set, execution step b-7);
By
Figure 871836DEST_PATH_IMAGE030
the hash function that is mapped to the Hash address can be expressed as:
Identical and cause all state sets of Hash table conflict for two bytes after MAC Address, all be stored in same linear linked list;
B-4). judge whether to exist the Hash table conflict, by the Hash address
Figure 677298DEST_PATH_IMAGE060
the state set at place is denoted as
Figure 670662DEST_PATH_IMAGE002
, judgement
Figure 424991DEST_PATH_IMAGE066
whether set up, if set up, will
Figure 348954DEST_PATH_IMAGE002
be denoted as
Figure 872339DEST_PATH_IMAGE062
, as
Figure 239867DEST_PATH_IMAGE030
corresponding state set, execution step b-7); If be false, perform step b-5);
B-5). traversal conflict chained list, with
Figure 481492DEST_PATH_IMAGE060
the state set at place is the linked list head node, and traversal reads the state set in chained list node , search and whether exist
Figure 592897DEST_PATH_IMAGE066
state set, if any the state set that satisfies condition, exist, will
Figure 928063DEST_PATH_IMAGE002
be denoted as
Figure 781618DEST_PATH_IMAGE062
, as
Figure 860433DEST_PATH_IMAGE030
corresponding state set, execution step b-7); If traveled through the conflict chained list, the state set all do not satisfied condition, perform step b-6);
B-6). newly-built state set, newly-built state set
Figure 296093DEST_PATH_IMAGE062
and it is added into to the end of existing conflict chained list, and to state set
Figure 254691DEST_PATH_IMAGE062
carry out initialization, will
Figure 143013DEST_PATH_IMAGE062
as
Figure 25518DEST_PATH_IMAGE030
corresponding state set, execution step b-7);
B-7). whether the sequence that judges storage signal intensity is full, with
Figure 378002DEST_PATH_IMAGE068
mean state set
Figure 507501DEST_PATH_IMAGE062
in
Figure 883118DEST_PATH_IMAGE070
the length of the current actual storage data of sequence,
Figure 303735DEST_PATH_IMAGE010
for its maximum length,
Figure 963256DEST_PATH_IMAGE010
for even number; Judgement
Figure 76705DEST_PATH_IMAGE072
whether set up, if set up, by this frame the value insetion sequence
Figure 163927DEST_PATH_IMAGE070
end, deposit in
Figure 225424DEST_PATH_IMAGE074
among; If be false, show
Figure 509775DEST_PATH_IMAGE068
reached the sequence maximum length , perform step b-8);
B-8). discharge segment space the storage of sequence
Figure 74934DEST_PATH_IMAGE032
, with
Figure 256517DEST_PATH_IMAGE076
mean former sequence, sequence after meaning to upgrade; Will
Figure 532963DEST_PATH_IMAGE076
the average conduct of first half segment data
Figure 36757DEST_PATH_IMAGE078
value, will
Figure 338425DEST_PATH_IMAGE076
the second half section data move to
Figure 699000DEST_PATH_IMAGE080
, and by this frame
Figure 273069DEST_PATH_IMAGE032
insert
Figure 642871DEST_PATH_IMAGE082
among,
Figure DEST_PATH_IMAGE178
C). upgrade the topological structure of WLAN: according to the complete sign of state set
Figure 652241DEST_PATH_IMAGE028
, determine whether data item relevant to topology in the treatment state collection
Figure 449295DEST_PATH_IMAGE012
,
Figure 995814DEST_PATH_IMAGE020
,
Figure 169307DEST_PATH_IMAGE022
with
Figure 179988DEST_PATH_IMAGE024
, according to frame type and subframe type, the incidence relation between decision state collection type and STA/AP, build and upgrade based on " the AP chained list+
Figure 272578DEST_PATH_IMAGE024
sequence " the WLAN topological structure; The AP chained list is a linear linked list, can carry out index to the AP state set in Hash table, and in the AP chained list, the structure of each node is:
Figure 368710DEST_PATH_IMAGE034
As shown in Figure 4, Figure 5 and Figure 6, provided respectively the flow chart of the WLAN topological structure update method based on management frames, control frame and Frame in the present invention;
If the target MAC (Media Access Control) address of the radio frames of catching is
Figure 80314DEST_PATH_IMAGE084
,
Figure 132452DEST_PATH_IMAGE086
for target MAC (Media Access Control) address
Figure 271310DEST_PATH_IMAGE084
corresponding state set; Source MAC is
Figure 792421DEST_PATH_IMAGE030
,
Figure 42137DEST_PATH_IMAGE062
for source MAC corresponding state set; Step c) topological structure of described renewal WLAN can adopt following steps to realize:
C-1). the type of judgement radio frames, for step b-1) radio frames that reads, if management frames performs step c-2), if control frame performs step c-3), if Frame performs step c-4);
C-2). the subtype of judgement management frames, if probe requests thereby performs step c-2-1), if beacon performs step c-2-2), if probe response performs step c-2-3), if associated response or again associated response perform step c-2-4), if associated request or again associated request perform step c-2-5);
C-2-1). judgement
Figure 524119DEST_PATH_IMAGE088
whether set up, if set up, order
Figure 594844DEST_PATH_IMAGE090
, return to step b-1); If be false, return to step b-1);
C-2-2). judgement whether set up, if set up, return to step b-1); If be false, perform step c-2-2-1);
C-2-2-1). judgement
Figure 425713DEST_PATH_IMAGE088
whether set up, if set up, arrange , and will
Figure 385765DEST_PATH_IMAGE062
memory address insert the end of AP chained list, execution step c-2-2-2); If be false, perform step c-2-2-2);
C-2-2-2). according to the frame content obtaining
Figure 242863DEST_PATH_IMAGE096
with
Figure 874832DEST_PATH_IMAGE098
value, and arrange
Figure 713344DEST_PATH_IMAGE092
, return to step b-1);
C-2-3). judgement whether set up, if set up, execution step c-2-3-3); If be false, perform step c-2-3-1);
C-2-3-1). judgement
Figure 91553DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-3-2); If set up, first arrange
Figure 827297DEST_PATH_IMAGE094
, and will
Figure 915338DEST_PATH_IMAGE062
memory address insert the end of AP chained list, then perform step c-2-3-2);
C-2-3-2). according to the frame content obtaining
Figure 120055DEST_PATH_IMAGE096
with value, and arrange
Figure 909205DEST_PATH_IMAGE092
, execution step c-2-3-3);
C-2-3-3). search target MAC (Media Access Control) address based on Hash table
Figure 556698DEST_PATH_IMAGE084
corresponding state set
Figure 311027DEST_PATH_IMAGE086
, and the judgement state set
Figure 48039DEST_PATH_IMAGE086
in
Figure 509108DEST_PATH_IMAGE100
whether set up, if set up, arrange
Figure 125903DEST_PATH_IMAGE102
, return to step b-1); If be false, return to step b-1);
C-2-4). judgement
Figure 101949DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-4-1); If set up, arrange
Figure 580335DEST_PATH_IMAGE094
, and will memory address insert the end of AP chained list, then perform step c-2-4-1);
C-2-4-1). search target MAC (Media Access Control) address based on Hash table
Figure 745923DEST_PATH_IMAGE084
corresponding state set
Figure 474844DEST_PATH_IMAGE086
, and the judgement state set
Figure 491342DEST_PATH_IMAGE086
in
Figure 989319DEST_PATH_IMAGE100
whether set up, if set up, arrange
Figure 682338DEST_PATH_IMAGE102
, return to step b-1); If be false, return to step b-1);
C-2-5). judgement
Figure 836238DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-5-1); If set up, first arrange
Figure 718744DEST_PATH_IMAGE090
, then perform step c-2-5-1);
C-2-5-1). search target MAC (Media Access Control) address based on Hash table
Figure 71228DEST_PATH_IMAGE084
corresponding state set
Figure 138410DEST_PATH_IMAGE086
, and judgement whether set up, if set up, return to step b-1); If be false, perform step c-2-5-2);
C-2-5-2). judgement
Figure 260877DEST_PATH_IMAGE100
whether set up, if be false, perform step c-2-5-3); If set up, arrange
Figure 733447DEST_PATH_IMAGE106
, and will
Figure 768268DEST_PATH_IMAGE086
memory address insert the end of AP chained list, then perform step c-2-5-3);
C-2-5-3). judgement content be whether empty, if be sky, directly return to step b-1); Empty if,, according to the frame content, obtain
Figure 855490DEST_PATH_IMAGE108
value, then return to step b-1);
C-3). the subtype of judgement control frame, if energy-conservation poll is searched target MAC (Media Access Control) address based on Hash table
Figure 182566DEST_PATH_IMAGE084
corresponding state set , execution step c-3-1); If other subtype, return to step b-1);
C-3-1). judgement
Figure 4077DEST_PATH_IMAGE092
whether set up, if set up, perform step c-3-4); If be false, perform step c-3-2);
C-3-2). judgement whether set up, if be false, perform step c-3-3); If set up, first arrange
Figure 135030DEST_PATH_IMAGE090
, then perform step c-3-3);
C-3-3). will
Figure 527965DEST_PATH_IMAGE062
memory address insert its father node
Figure 427788DEST_PATH_IMAGE086
in
Figure 180850DEST_PATH_IMAGE110
the end of sequence, and sequence
Figure 216939DEST_PATH_IMAGE112
length
Figure 780775DEST_PATH_IMAGE114
increase by 1; And arrange
Figure 167894DEST_PATH_IMAGE092
, execution step c-3-4);
C-3-4). judgement
Figure 459067DEST_PATH_IMAGE100
whether set up, if be false, return to step b-1); If set up, arrange
Figure 615242DEST_PATH_IMAGE106
, and will memory address insert the end of AP chained list, return to step b-1);
C-4). based on Hash table, search target MAC (Media Access Control) address corresponding state set
Figure 132308DEST_PATH_IMAGE086
; The transmission direction of judgement Frame, if uplink frame performs step c-4-1); If it performs step c-4-2 for downlink frame);
C-4-1). judgement whether set up, if set up, perform step c-4-1-3); If be false, perform step c-4-1-1);
C-4-1-1). judgement
Figure 235579DEST_PATH_IMAGE088
whether set up, if be false, perform step c-4-1-2); If set up, first arrange
Figure 518662DEST_PATH_IMAGE090
, then perform step c-4-1-2);
C-4-1-2). will memory address insert its father node
Figure 33137DEST_PATH_IMAGE086
in
Figure 939755DEST_PATH_IMAGE110
the end of sequence, and sequence
Figure 523183DEST_PATH_IMAGE112
length
Figure 710582DEST_PATH_IMAGE114
increase by 1; Arrange
Figure 695856DEST_PATH_IMAGE092
, execution step c-4-1-3);
C-4-1-3). judgement
Figure 192565DEST_PATH_IMAGE100
whether set up, if be false, return to step b-1); If set up, arrange
Figure 263289DEST_PATH_IMAGE106
, and will memory address insert the end of AP chained list, return to step b-1);
C-4-2). judgement whether set up, if be false, perform step c-4-2-1); If set up, arrange
Figure 574819DEST_PATH_IMAGE094
, and will memory address insert the end of AP chained list, execution step c-4-2-1);
C-4-2-1). judgement
Figure 917168DEST_PATH_IMAGE104
whether set up, if set up, return to step b-1); If be false, perform step c-4-2-2);
C-4-2-2). judgement
Figure 611454DEST_PATH_IMAGE100
whether set up, if be false, perform step c-4-2-3); If set up, first arrange , then perform step c-4-2-3);
C-4-2-3). will
Figure 432966DEST_PATH_IMAGE086
memory address insert its father node in
Figure 376968DEST_PATH_IMAGE110
the end of sequence, and sequence
Figure 402693DEST_PATH_IMAGE116
length
Figure 669726DEST_PATH_IMAGE114
increase by 1; Arrange
Figure 789998DEST_PATH_IMAGE104
, return to step b-1).
D). with the time
Figure 396559DEST_PATH_IMAGE036
for the cycle, the WLAN topological structure is traveled through, utilize AP state set and first kind STA state set in the WLAN topological structure, upgrade the node data in existing topological tree list, and search, mark RSSI average statistical
Figure 842453DEST_PATH_IMAGE038
maximum STA; First kind STA state set is and
Figure 271477DEST_PATH_IMAGE040
state set; The topological tree list is the form that adopts tree-shaped hierarchical lists, to the output display result of each AP state set in the WLAN topological structure and first kind STA state set;
Figure 794863DEST_PATH_IMAGE038
to sequence
Figure 146078DEST_PATH_IMAGE008
the average statistical of interior all elements;
As shown in Figure 7, provided the state set utilized in the WLAN topological structure and the topological tree list has been carried out to the flow chart of periodical update method;
If
Figure 387704DEST_PATH_IMAGE118
for the label of AP chained list interior nodes,
Figure 866090DEST_PATH_IMAGE120
for in the AP chained list
Figure 243982DEST_PATH_IMAGE118
the AP state set of individual node institute index,
Figure 31678DEST_PATH_IMAGE122
for
Figure 432703DEST_PATH_IMAGE124
the label of sequence interior element, for
Figure 275074DEST_PATH_IMAGE124
in sequence the
Figure 968093DEST_PATH_IMAGE122
the STA state set of individual element institute index,
Figure 184310DEST_PATH_IMAGE128
maximum average statistical for signal strength signal intensity RSSI; In the topological tree list, each AP state set is positioned at father node list layer, each first kind STA state set is positioned at the child node list layer under corresponding A P, the data item that the AP node shows is MAC Address, channel number, SSID, RSSI average statistical and the sum of catching radio frames, and the data item that the STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; The processing that state set in the described WLAN of the utilization topological structure of step d) is periodically updated the topological tree list can adopt following steps to realize:
D-1). obtain the AP node sum in existing topological tree list
Figure 4499DEST_PATH_IMAGE130
;
D-2). initial value is set, and the position of reading of AP chained list is set to the linked list head node, and the AP nodal scheme is set
Figure 356983DEST_PATH_IMAGE118
initial value be " 0 ", the maximum average statistical of RSSI initial value be-90, the execution step d-3);
D-3). whether the judgement traversal completes, and judges whether the AP chained list has traveled through, if complete, performs step d-16); If do not traveled through, performed step d-4);
D-4). a node is read in the pre-treatment position of working as at the AP chained list, and arranges
Figure 658837DEST_PATH_IMAGE132
; Obtain the AP state set mAC Address, channel number, SSID and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step d-5 based on singular point filtering and average value processing method);
D-5). compare label
Figure 489707DEST_PATH_IMAGE118
with AP node sum
Figure 603156DEST_PATH_IMAGE130
, judgement whether set up, if set up, execution step d-6); If be false, perform step d-7);
D-6). compare the AP state set
Figure 871469DEST_PATH_IMAGE120
with in the topological tree list
Figure 198546DEST_PATH_IMAGE118
the corresponding data item of individual AP node, upgraded for inconsistent data item; And obtain topological tree list
Figure 669847DEST_PATH_IMAGE118
the child node sum of individual AP node
Figure 754478DEST_PATH_IMAGE136
, execution step d-8);
D-7). utilize
Figure 782477DEST_PATH_IMAGE120
build new node, add the end of AP list in existing topological tree list, execution step d-8);
D-8). initialization
Figure 964059DEST_PATH_IMAGE122
, will
Figure 606262DEST_PATH_IMAGE124
the element numerals of sequence
Figure 506085DEST_PATH_IMAGE122
be set to " 1 ", execution step d-9);
D-9). the judgement sequence
Figure 9879DEST_PATH_IMAGE124
in all elements whether read completely, if read completely, perform step d-3); If do not read completely, perform step d-10);
D-10). read sequence ?
Figure 859072DEST_PATH_IMAGE122
individual element, obtain the STA state set
Figure 980612DEST_PATH_IMAGE126
mAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI based on singular point filtering and average value processing method , execution step d-11);
D-11). signal strength signal intensity relatively, compares
Figure 444271DEST_PATH_IMAGE138
with
Figure 241326DEST_PATH_IMAGE128
size, if
Figure 37112DEST_PATH_IMAGE140
, perform step d-12); If
Figure 945025DEST_PATH_IMAGE142
, with
Figure 955707DEST_PATH_IMAGE144
with
Figure 861346DEST_PATH_IMAGE146
record
Figure 144429DEST_PATH_IMAGE118
with
Figure 856033DEST_PATH_IMAGE122
value, and arrange , execution step d-12);
D-12). judgement
Figure 63340DEST_PATH_IMAGE134
whether set up, if set up, execution step d-13); If be false, perform step d-14);
D-13). judgement
Figure 381189DEST_PATH_IMAGE150
whether set up, if set up, compare
Figure 83435DEST_PATH_IMAGE126
with topological tree list
Figure 68708DEST_PATH_IMAGE118
of individual AP node
Figure 316150DEST_PATH_IMAGE122
the corresponding data item of individual child node, and inconsistent data item is upgraded to execution step d-15); If be false, perform step d-14);
D-14). utilize build new node, add topological tree list the
Figure 361652DEST_PATH_IMAGE118
the end of the child node list of individual AP node, execution step d-15);
D-15). arrange
Figure 139115DEST_PATH_IMAGE152
, redirect execution step d-9);
D-16). in the topological tree list the
Figure 892480DEST_PATH_IMAGE144
under individual AP node
Figure 637451DEST_PATH_IMAGE146
individual STA node, be this there is the first kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
E). with the time
Figure 126518DEST_PATH_IMAGE042
for the cycle, the Equations of The Second Kind STA state set in Hash table is traveled through, utilize Equations of The Second Kind STA state set, upgrade the node data in existing not associated list, and search, mark RSSI average statistical
Figure 778080DEST_PATH_IMAGE038
maximum STA; Equations of The Second Kind STA state set is
Figure 744767DEST_PATH_IMAGE044
and
Figure 139977DEST_PATH_IMAGE046
state set; Not associated list is the form that adopts the individual layer list, to the output display result of each Equations of The Second Kind STA state set;
As shown in Figure 8, provided the Equations of The Second Kind STA state set utilized in Hash table and not associated list has been carried out to the flow chart of periodical update method;
If
Figure 78983DEST_PATH_IMAGE122
for the label of the Equations of The Second Kind STA state set that finds in Hash table,
Figure 839128DEST_PATH_IMAGE154
maximum average statistical for signal strength signal intensity RSSI; In not associated list, the data item that each STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; The described processing that utilizes the Equations of The Second Kind STA state set in Hash table to be periodically updated not associated list of step e) can adopt following steps to realize:
E-1). obtain the STA node sum in existing not associated list
Figure 106162DEST_PATH_IMAGE136
; To read position and be made as the original position of Hash table; Label
Figure 305062DEST_PATH_IMAGE156
, maximum RSSI average statistical
Figure 98574DEST_PATH_IMAGE158
;
E-2). whether judgement comprises the conflict chained list and has traveled through at interior Hash table, if complete, performs step e-7); If do not traveled through, performed step e-3);
E-3). a state set is read in the pre-treatment position of working as at Hash table
Figure 91938DEST_PATH_IMAGE002
, judge whether this state set meets
Figure 33218DEST_PATH_IMAGE046
and
Figure 35809DEST_PATH_IMAGE044
condition, if do not meet, it does not belong to Equations of The Second Kind STA state set, redirect execution step e-2); If meet, perform step e-4);
E-4). arrange
Figure 559195DEST_PATH_IMAGE152
; Obtain the STA state set
Figure 661143DEST_PATH_IMAGE126
mAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step e-5 based on singular point filtering and average value processing method);
E-5). signal strength signal intensity relatively, compares
Figure 902768DEST_PATH_IMAGE138
with
Figure 630422DEST_PATH_IMAGE154
size, if , perform step e-6); If
Figure 546742DEST_PATH_IMAGE162
, with
Figure 10084DEST_PATH_IMAGE146
record
Figure 535569DEST_PATH_IMAGE122
value, and arrange
Figure 705651DEST_PATH_IMAGE164
, execution step e-6);
E-6). judgement
Figure 664248DEST_PATH_IMAGE150
whether set up, if set up, compare
Figure 614887DEST_PATH_IMAGE126
with not associated list the corresponding data item of individual STA node, and inconsistent data item is upgraded to execution step e-2); If be false, utilize
Figure 787559DEST_PATH_IMAGE126
build new node, add the end of existing not associated list, execution step e-2);
E-7). judgement
Figure 917058DEST_PATH_IMAGE150
whether set up, if be false, perform step e-8); If set up, the existing not associated list end of deletion
Figure 354993DEST_PATH_IMAGE166
individual STA node, execution step e-8); After Hash table has traveled through, here recorded the sum of the Equations of The Second Kind STA state set found;
E-8). of not associated list individual STA node, be this
Figure 299312DEST_PATH_IMAGE042
there is the Equations of The Second Kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
F). judge specific objective user's MAC Address, work as steps d) in described topological tree list and step e) institute's mark in described not associated list
Figure 411493DEST_PATH_IMAGE038
when maximum STA node all keeps stablizing, compare the RSSI average statistical of STA in two steps, have larger among both
Figure 635801DEST_PATH_IMAGE038
the corresponding MAC Address of STA node, be specific objective user's MAC Address.
If
Figure 900561DEST_PATH_IMAGE168
for the STA node of institute's mark in the STA node of institute's mark in the topological tree list and not associated list all keeps the stable time, when any in both changes,
Figure 106283DEST_PATH_IMAGE168
all reset to 0; The described processing that the specific objective user's MAC address is judged of step f) can adopt following steps to realize:
F-1). judge stabilization time
Figure 456493DEST_PATH_IMAGE168
whether reach threshold value
Figure 484492DEST_PATH_IMAGE170
if reach
Figure 666074DEST_PATH_IMAGE170
, perform step f-2); If do not reach, random wait performs step f-1 again after a period of time);
F-2). relatively
Figure 432911DEST_PATH_IMAGE128
with the size of value, if
Figure 570948DEST_PATH_IMAGE172
, by the STA node determination of institute's mark in the topological tree list, be specific objective, return to its MAC Address; If
Figure 59567DEST_PATH_IMAGE174
, by the STA node determination of institute's mark in not associated list, be specific objective, return to its MAC Address.
wherein:
For step a), in whole available channels or allocated channel, effectively obtaining all kinds of radio frames (comprising that 5 ghz bands meet wireless management frame, control frame and the Frame of 802.11 a standards, 2.4 ghz band 802.11 b/g standards and 2.4/5 ghz band 802.11n standard) of transmitting by airlink, is basis and the prerequisite that the MAC Address of specific objective STA is caught.
For step b), the RSSI value of each radio frames is updated in source MAC institute corresponding states collection fast
Figure 332327DEST_PATH_IMAGE008
sequence is the key problem that realizes efficiently and accurately the MAC Address catching method based on RSSI.
Preferably, by each STA/AP state set
Figure 453867DEST_PATH_IMAGE002
as one " record ", with
Figure 761351DEST_PATH_IMAGE006
as " keyword " of this record, build the Hash table about each STA/AP state set in the data acquisition module range of receiving, can realize the direct mapping to the memory location of institute's corresponding states collection in Hash table by the source MAC of radio frames.Because MAC Address is comprised of 6 bytes (48 bit), co-exist in
Figure DEST_PATH_IMAGE180
plant possible value, therefore can't be directly used as the Hash address; Desirable its last two bytes (
Figure 104477DEST_PATH_IMAGE006
the 5th, 6 elements) as the Hash address, the length of constructed Hash table is thus , for example, for MAC Address " 00-A1-B0-BF-05-14 ", can directly determine its corresponding state set position in Hash table, .
Yet when rear two bytes of the MAC Address of several STA/AP when identical, its state set will have identical Hash address, the Hash address that is two STA state sets of " 00-A1-B0-BF-05-14 " and " 8C-A9-82-65-05-14 " as MAC Address is 1300, thereby causes the Hash table collision problem.
Preferably, adopt the Hash table conflict processing method based on the chain address, identical all STA/AP state sets by two bytes after MAC Address, all be stored in same linear linked list.Due to hash function be uniformly, therefore in Hash table and conflict chained list, search and meet
Figure 26165DEST_PATH_IMAGE066
state set, the average length of search while searching success and failure is respectively
Figure DEST_PATH_IMAGE188
,
Figure DEST_PATH_IMAGE190
In formula
Figure DEST_PATH_IMAGE192
the load factor (insert and record number/Hash table length) that means Hash table.It is long that STA/AP quantity in common data acquisition module range of receiving is far smaller than Hash table, therefore
Figure DEST_PATH_IMAGE194
with
Figure DEST_PATH_IMAGE196
all be approximately 1, visible the method has very high search efficiency.
Because the method can be carried out efficiently for a large amount of radio frames of catching, state set is searched and upgraded fast, so it has the advantage of " wireless data amount applicability ".
For step c), the necessity that builds the wlan network topological structure is: (1) can the Hash table larger at degree of rarefication in, for occurred STA/AP state set is set up effective index structure, to travel through fast each state set and to obtain the global optimum of RSSI; (2) can set up the incidence relation between each STA/AP state set, to obtain specific objective the STA AP accessed and the wireless channel used.
Preferably, in Infrastructure(foundation structure) in the WLAN of pattern, can network topology structure be described by " set membership " between AP and STA.The AP chained list can carry out index to the AP state set, and in the AP state set sequence can be carried out index to its each STA child node; Therefore, based on " the AP chained list+ sequence " can build complete WLAN topological structure.
Preferably, to each data item relevant to topological structure in state set (
Figure DEST_PATH_IMAGE198
,
Figure DEST_PATH_IMAGE200
, with
Figure 859321DEST_PATH_IMAGE110
) and the processing method of AP chained list can comprise: in the detected state collection
Figure DEST_PATH_IMAGE204
sign, if or
Figure 110359DEST_PATH_IMAGE104
, it is follow-up right to skip
Figure 759647DEST_PATH_IMAGE062
or
Figure 624834DEST_PATH_IMAGE086
processing; If judge first
Figure 950642DEST_PATH_IMAGE094
or
Figure 534071DEST_PATH_IMAGE106
(being that type is AP), with
Figure 987049DEST_PATH_IMAGE062
or
Figure 706743DEST_PATH_IMAGE086
memory address build new node, and insert the end of AP chained list; Management frames by specific subtype (as " beacon " frame etc.) can obtain in the AP state set
Figure 203452DEST_PATH_IMAGE200
with
Figure 274176DEST_PATH_IMAGE202
value; Control frame (as " energy-conservation poll " frame etc.) by Frame or specific subtype can be determined with
Figure 105046DEST_PATH_IMAGE086
between incidence relation, thereby the memory address of STA state set is inserted in the AP state set
Figure 585706DEST_PATH_IMAGE110
sequence.
When STA has accessed AP, and the data volume of transmitting-receiving is when larger, and the first Frame based on caught can be judged
Figure 330677DEST_PATH_IMAGE062
,
Figure 922195DEST_PATH_IMAGE086
type and determine incidence relation, thereby skip the processing to follow-up a large amount of frames; And do not access AP as STA, or accessed AP but the data of transmitting-receiving when less, the management frames based on a small amount of or control frame also can partly be judged ,
Figure 471305DEST_PATH_IMAGE086
type; Therefore, said method has the advantage of " network-in-dialing applicability " and " wireless data amount applicability ".
For step d) and step e), WLAN topological structure and each STA/AP state set are carried out to periodicity traversal and data analysis, based on each
Figure 251043DEST_PATH_IMAGE008
the corresponding RSSI average statistical of each STA of retrieval, and the STA that will have a Global maximum RSSI is defined as specific objective, is the key that finally realizes that MAC Address is caught.
Preferably, the data processing method based on a kind of high efficiency, low precision, calculate sequence in each state set fast
Figure 833203DEST_PATH_IMAGE008
average statistical.Conventional data processing method is at first based on singular point detection method (as the method based on based on wavelet modulus maxima), to eliminate the sudden change value in initial data; Then based on filtering method (as the method based on Kalman filtering), data are carried out to smoothing processing, eliminate the interference such as white noise; The mean value of last calculated data.But the amount of calculation of the method such as wavelet method, Kalman filtering is relatively large, while in the data acquisition module range of receiving, having more STA/AP, the relatively weak handheld terminal of disposal ability just can't complete the data statistics to a plurality of state sets in real time; Simultaneously, in the WLAN of circumstance complication, the parameter in the filter model such as Kalman also is difficult to determine, therefore, conventional method also is not suitable for the scene demand that the specific objective MAC Address is caught.Due to the maximum that only needs to obtain the RSSI statistical value, and not high to the requirement of its accuracy, therefore can simplify the singular point filtering method, and omit filter step, quick obtaining
Figure 647575DEST_PATH_IMAGE008
average statistical: at first calculate original series
Figure 407720DEST_PATH_IMAGE008
mean value, be designated as
Figure DEST_PATH_IMAGE206
; Then the empirical value based on setting
Figure DEST_PATH_IMAGE208
, when arbitrary
Figure DEST_PATH_IMAGE210
with
Figure 570628DEST_PATH_IMAGE206
difference higher than
Figure 769528DEST_PATH_IMAGE208
the time, it can be identified as to singular point and filtering; Finally calculate
Figure 625357DEST_PATH_IMAGE008
the mean value of interior remaining data, be designated as
Figure 618721DEST_PATH_IMAGE038
:
Figure DEST_PATH_IMAGE212
In formula
Figure DEST_PATH_IMAGE214
radio frames quantity after expression filtering singular point.In the MAC Address acquisition procedure, the relative position between data acquisition module and specific objective remains unchanged, so the effective filtering singular point obtain relatively accurate average statistical of said method.
Preferably, the STA in the data acquisition module range of receiving is divided into to " being associated to AP " and " not associated to AP " two classes: only working as entity type is STA, and in its state set
Figure 497684DEST_PATH_IMAGE040
the time, be classified to the first kind; If entity type be STA and
Figure 172379DEST_PATH_IMAGE046
, or (entity type is not yet determined
Figure 876856DEST_PATH_IMAGE018
), be classified to Equations of The Second Kind.
Preferably, with the time
Figure 306700DEST_PATH_IMAGE036
for the cycle, the WLAN topological structure is traveled through and the topological tree list is upgraded; With
Figure 486009DEST_PATH_IMAGE042
for the cycle, the Equations of The Second Kind STA state set in Hash table is traveled through and not associated list is upgraded.First kind STA state set can based on " the AP chained list+
Figure 948083DEST_PATH_IMAGE024
sequence " structure carry out quick indexing, and the more frequent updating that needs of data because transmitting between itself and AP usually
Figure 591554DEST_PATH_IMAGE008
statistical value; And Equations of The Second Kind STA state set only can carry out inefficient searching by traveling through whole Hash table, and usually less without frequent updating because of the transmission data statistical value; Therefore, can be set the traversal cycle .
The method can be judged the Global maximum person from the RSSI average statistical of any number of STA, therefore has the advantage of " multi-user's applicability ".Due to data acquisition module and specific objective STA, all in non-moving state, only need less
Figure 780276DEST_PATH_IMAGE036
with
Figure 859090DEST_PATH_IMAGE042
cycle can be obtained stable RSSI statistics; The method operand is little simultaneously, be suitable for realizing at portable equipment, so it has the advantage of " evidence obtaining rapidity and seamless property ".

Claims (7)

1. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user, AP is the access points in WLAN, and STA is subscriber terminal equipment, and RSSI is the received signal strength index, it is characterized in that, comprises the following steps successively:
A). data acquisition, choose with specific objective STA at a distance of near, with the position of other user's apart from each others, based on scan channel strategy, time threshold strategy and data volume threshold strategies, obtain all kinds of radio frames of transmitting by airlink in WLAN;
B). build state set and upgrade the RSSI sequence based on Hash table, establishing set be the set of the state information of a STA or AP, be called " state set ",
Figure 593594DEST_PATH_IMAGE002
be denoted as:
Wherein,
Figure DEST_PATH_IMAGE006
for length be 6 bytes sequence, the MAC Address of storage STA/AP; Due to the uniqueness of MAC Address, can by
Figure 676825DEST_PATH_IMAGE006
as to this state set
Figure 440513DEST_PATH_IMAGE002
only sign;
Figure DEST_PATH_IMAGE008
for maximum length is sequence, the storage source MAC of having caught is
Figure 714498DEST_PATH_IMAGE006
the RSSI value of each radio frames, each element is the integer value between-90 to 20, linear module is dBm;
Figure DEST_PATH_IMAGE012
the type of presentation-entity,
Figure DEST_PATH_IMAGE014
mean that it is AP,
Figure DEST_PATH_IMAGE016
mean that it is STA,
Figure DEST_PATH_IMAGE018
mean that its type is not yet definite;
Figure DEST_PATH_IMAGE020
: only work as
Figure 4665DEST_PATH_IMAGE014
shi Youxiao, store the SSID of this AP; : only work as
Figure 258798DEST_PATH_IMAGE014
shi Youxiao, store the wireless communication Taoist monastic name of the current use of this AP;
Figure DEST_PATH_IMAGE024
: only work as shi Youxiao, for each STA child node of this AP of index, is that maximum length is
Figure DEST_PATH_IMAGE026
sequence, each element is respectively the memory address of the corresponding STA state set of each child node;
Figure DEST_PATH_IMAGE028
for Boolean type numerical value, indication
Figure 992716DEST_PATH_IMAGE002
whether each interior state information is complete, when the time, whether be used to indicate and obtain this AP's
Figure 952636DEST_PATH_IMAGE020
with data item; When
Figure 164492DEST_PATH_IMAGE016
the time, be used to indicate and whether the memory address of this STA state set inserted to its father node
Figure 39038DEST_PATH_IMAGE024
sequence;
Each radio frames of a) obtaining for step, based on " MAC Address → state set in Hash table
Figure 385706DEST_PATH_IMAGE002
memory address " direct mapping, fast finding or build the source MAC of this frame
Figure DEST_PATH_IMAGE030
corresponding state set
Figure 798232DEST_PATH_IMAGE002
, and by the RSSI value of this frame
Figure DEST_PATH_IMAGE032
be updated to sequence
Figure 137816DEST_PATH_IMAGE008
;
C). upgrade the topological structure of WLAN: according to sign , determine whether data item relevant to topology in the treatment state collection
Figure 571388DEST_PATH_IMAGE012
,
Figure 471211DEST_PATH_IMAGE020
,
Figure 850371DEST_PATH_IMAGE022
with
Figure 152039DEST_PATH_IMAGE024
, according to frame type and subframe type, the incidence relation between decision state collection type and STA/AP, build and upgrade based on " the AP chained list+ sequence " the WLAN topological structure; The AP chained list is a linear linked list, can carry out index to the AP state set in Hash table, and in the AP chained list, the structure of each node is:
D). with the time
Figure DEST_PATH_IMAGE036
for the cycle, the WLAN topological structure is traveled through, utilize AP state set and first kind STA state set in the WLAN topological structure, upgrade the node data in existing topological tree list, and search, mark RSSI average statistical
Figure DEST_PATH_IMAGE038
maximum STA; First kind STA state set is and
Figure DEST_PATH_IMAGE040
state set; The topological tree list is the form that adopts tree-shaped hierarchical lists, to the output display result of each AP state set in the WLAN topological structure and first kind STA state set;
Figure 586978DEST_PATH_IMAGE038
to sequence
Figure 789158DEST_PATH_IMAGE008
the average statistical of interior all elements;
E). with the time for the cycle, the Equations of The Second Kind STA state set in Hash table is traveled through, utilize Equations of The Second Kind STA state set, upgrade the node data in existing not associated list, and search, mark RSSI average statistical
Figure 648529DEST_PATH_IMAGE038
maximum STA; Equations of The Second Kind STA state set is
Figure DEST_PATH_IMAGE044
and
Figure DEST_PATH_IMAGE046
state set; Not associated list is the form that adopts the individual layer list, to the output display result of each Equations of The Second Kind STA state set;
F). judge specific objective user's MAC Address, work as steps d) in described topological tree list and step e) institute's mark in described not associated list
Figure 444316DEST_PATH_IMAGE038
when maximum STA node all keeps stablizing, compare the RSSI average statistical of STA in two steps, have larger among both
Figure 617808DEST_PATH_IMAGE038
the corresponding MAC Address of STA node, be specific objective user's MAC Address.
2. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user according to claim 1, arrange sign
Figure DEST_PATH_IMAGE048
if,
Figure DEST_PATH_IMAGE050
, mean to start successively all channels to be scanned from first available channel, if
Figure DEST_PATH_IMAGE052
, mean particular channel is scanned; It is characterized in that, step a) described data acquisition comprises the following steps:
A-1). judgement scan channel strategy, judgement value, if
Figure 471812DEST_PATH_IMAGE050
, channel to be scanned is set to the first channel in whole available channels; If
Figure 630261DEST_PATH_IMAGE052
, channel to be scanned is set to input value
Figure DEST_PATH_IMAGE054
corresponding channel;
A-2). mode of operation is set to RF Monitor Mode; Under this pattern, can be caught all radio frames of each STA/AP transmission in current scanning channel;
A-3). catch radio frames and carry out verification, catch a radio frames and carry out CRC check, if incorrect through CRC check, this frame being abandoned and radio frames of recapture; If CRC check is correct, this frame is kept in to buffering area to execution step a-4);
A-4). the judgement of capture time threshold value, whether the time that radio frames is caught in judgement reaches the capture time threshold value
Figure DEST_PATH_IMAGE056
if reach
Figure 653449DEST_PATH_IMAGE056
, perform step a-6); If do not reach
Figure 456320DEST_PATH_IMAGE056
, perform step a-5);
A-5). the judgement of capture-data amount threshold value, whether the data volume that radio frames is caught in judgement reaches capture-data amount threshold value
Figure DEST_PATH_IMAGE058
if reach
Figure 900903DEST_PATH_IMAGE058
, perform step a-6); If do not reach
Figure 484331DEST_PATH_IMAGE058
, perform step a-3);
A-6). submit data to, the wireless frame data be temporarily stored in buffering area is carried out to the batch submission, execution step a-7);
A-7). judgement
Figure 796363DEST_PATH_IMAGE048
, judgement
Figure 781637DEST_PATH_IMAGE048
value, if
Figure 904445DEST_PATH_IMAGE050
, monitor next available channel; If
Figure 975169DEST_PATH_IMAGE052
, again current channel is monitored; Execution step a-3).
3. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user according to claim 1 and 2, is characterized in that step b) described build state set and upgrade the RSSI sequence based on Hash table comprise the following steps:
B-1). read radio frames and judge its type; Read a radio frames the batch data of a) submitting to from step, and judge whether it is CTS or the ACK subframe in control frame, and CTS or ACK subframe, re-execute step b-1 if); If, neither the CTS subframe neither the ACK subframe, obtain the source MAC of this frame and strength signal
Figure 930673DEST_PATH_IMAGE032
; Here the abbreviation that CTS is Clear To Send, be the clear to send (CTS) subframe, and the abbreviation that ACK is Acknowledge, for confirming subframe, does not all contain the MAC Address of source in these two kinds of subframes;
B-2). with rear two bytes calculate Hash addresses corresponding to source MAC
Figure DEST_PATH_IMAGE060
, and judge whether the record at this place, Hash address is empty, and sky performs step b-3 if); If be not empty, perform step b-4);
B-3). in the Hash address
Figure 77675DEST_PATH_IMAGE060
locate newly-built state set
Figure DEST_PATH_IMAGE062
, and to state set
Figure 747822DEST_PATH_IMAGE062
carry out initialization, will
Figure 442108DEST_PATH_IMAGE062
as
Figure 155986DEST_PATH_IMAGE030
corresponding state set, execution step b-7);
By
Figure 512887DEST_PATH_IMAGE030
the hash function that is mapped to the Hash address can be expressed as:
Figure DEST_PATH_IMAGE064
Identical and cause all state sets of Hash table conflict for two bytes after MAC Address, all be stored in same linear linked list;
B-4). judge whether to exist the Hash table conflict, by the Hash address the state set at place is denoted as
Figure 519206DEST_PATH_IMAGE002
, judgement whether set up, if set up, will be denoted as
Figure 687331DEST_PATH_IMAGE062
, as
Figure 948548DEST_PATH_IMAGE030
corresponding state set, execution step b-7); If be false, perform step b-5);
B-5). traversal conflict chained list, with
Figure 351847DEST_PATH_IMAGE060
the state set at place is the linked list head node, and traversal reads the state set in chained list node
Figure 610790DEST_PATH_IMAGE002
, search and whether exist state set, if any the state set that satisfies condition, exist, will
Figure 292012DEST_PATH_IMAGE002
be denoted as
Figure 815397DEST_PATH_IMAGE062
, as
Figure 307558DEST_PATH_IMAGE030
corresponding state set, execution step b-7); If traveled through the conflict chained list, the state set all do not satisfied condition, perform step b-6);
B-6). newly-built state set, newly-built state set
Figure 283605DEST_PATH_IMAGE062
and it is added into to the end of existing conflict chained list, and to state set
Figure 153470DEST_PATH_IMAGE062
carry out initialization, will as
Figure 194424DEST_PATH_IMAGE030
corresponding state set, execution step b-7);
B-7). whether the sequence that judges storage signal intensity is full, with
Figure DEST_PATH_IMAGE068
mean state set
Figure 798712DEST_PATH_IMAGE062
in
Figure DEST_PATH_IMAGE070
the length of the current actual storage data of sequence,
Figure 251428DEST_PATH_IMAGE010
for its maximum length,
Figure 749405DEST_PATH_IMAGE010
for even number; Judgement
Figure DEST_PATH_IMAGE072
whether set up, if set up, by this frame
Figure 68522DEST_PATH_IMAGE032
the value insetion sequence
Figure 284740DEST_PATH_IMAGE070
end, deposit in
Figure DEST_PATH_IMAGE074
among; If be false, show
Figure 541147DEST_PATH_IMAGE068
reached the sequence maximum length
Figure 893631DEST_PATH_IMAGE010
, perform step b-8);
B-8). discharge segment space the storage of sequence
Figure 898496DEST_PATH_IMAGE032
, with
Figure DEST_PATH_IMAGE076
mean former sequence,
Figure 149480DEST_PATH_IMAGE070
sequence after meaning to upgrade; Will
Figure 570097DEST_PATH_IMAGE076
the average conduct of first half segment data
Figure DEST_PATH_IMAGE078
value, will
Figure 104983DEST_PATH_IMAGE076
the second half section data move to
Figure DEST_PATH_IMAGE080
, and by this frame
Figure 264438DEST_PATH_IMAGE032
insert among.
4. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user according to claim 3, is characterized in that, the target MAC (Media Access Control) address of establishing caught radio frames is
Figure DEST_PATH_IMAGE084
,
Figure DEST_PATH_IMAGE086
for
Figure 251986DEST_PATH_IMAGE084
corresponding state set; Source MAC is
Figure 289343DEST_PATH_IMAGE030
,
Figure 871546DEST_PATH_IMAGE062
for corresponding state set; Step c) topological structure of described renewal WLAN comprises the following steps:
C-1). the type of judgement radio frames, for step b-1) radio frames that reads, if management frames performs step c-2), if control frame performs step c-3), if Frame performs step c-4);
C-2). the subtype of judgement management frames, if probe requests thereby performs step c-2-1), if beacon performs step c-2-2), if probe response performs step c-2-3), if associated response or again associated response perform step c-2-4), if associated request or again associated request perform step c-2-5);
C-2-1). judgement
Figure DEST_PATH_IMAGE088
whether set up, if set up, order
Figure DEST_PATH_IMAGE090
, return to step b-1); If be false, return to step b-1);
C-2-2). judgement
Figure DEST_PATH_IMAGE092
whether set up, if set up, return to step b-1); If be false, perform step c-2-2-1);
C-2-2-1). judgement
Figure 817691DEST_PATH_IMAGE088
whether set up, if set up, arrange , and will
Figure 580111DEST_PATH_IMAGE062
memory address insert the end of AP chained list, execution step c-2-2-2); If be false, perform step c-2-2-2);
C-2-2-2). according to the frame content obtaining
Figure DEST_PATH_IMAGE096
with
Figure DEST_PATH_IMAGE098
value, and arrange
Figure 135595DEST_PATH_IMAGE092
, return to step b-1);
C-2-3). judgement
Figure 590847DEST_PATH_IMAGE092
whether set up, if set up, execution step c-2-3-3); If be false, perform step c-2-3-1);
C-2-3-1). judgement
Figure 490670DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-3-2); If set up, first arrange , and will
Figure 155186DEST_PATH_IMAGE062
memory address insert the end of AP chained list, then perform step c-2-3-2);
C-2-3-2). according to the frame content obtaining
Figure 594389DEST_PATH_IMAGE096
with
Figure 43825DEST_PATH_IMAGE098
value, and arrange
Figure 148047DEST_PATH_IMAGE092
, execution step c-2-3-3);
C-2-3-3). search target MAC (Media Access Control) address based on Hash table corresponding state set
Figure 412861DEST_PATH_IMAGE086
, and the judgement state set
Figure 84014DEST_PATH_IMAGE086
in
Figure DEST_PATH_IMAGE100
whether set up, if set up, arrange
Figure DEST_PATH_IMAGE102
, return to step b-1); If be false, return to step b-1);
C-2-4). judgement
Figure 132873DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-4-1); If set up, arrange
Figure 143554DEST_PATH_IMAGE094
, and will
Figure 417235DEST_PATH_IMAGE062
memory address insert the end of AP chained list, then perform step c-2-4-1);
C-2-4-1). search target MAC (Media Access Control) address based on Hash table corresponding state set , and the judgement state set
Figure 152476DEST_PATH_IMAGE086
in
Figure 291333DEST_PATH_IMAGE100
whether set up, if set up, arrange
Figure 687810DEST_PATH_IMAGE102
, return to step b-1); If be false, return to step b-1);
C-2-5). judgement
Figure 937526DEST_PATH_IMAGE088
whether set up, if be false, perform step c-2-5-1); If set up, first arrange
Figure 985117DEST_PATH_IMAGE090
, then perform step c-2-5-1);
C-2-5-1). search target MAC (Media Access Control) address based on Hash table
Figure 606460DEST_PATH_IMAGE084
corresponding state set
Figure 677184DEST_PATH_IMAGE086
, and judgement
Figure DEST_PATH_IMAGE104
whether set up, if set up, return to step b-1); If be false, perform step c-2-5-2);
C-2-5-2). judgement
Figure 792907DEST_PATH_IMAGE100
whether set up, if be false, perform step c-2-5-3); If set up, arrange
Figure DEST_PATH_IMAGE106
, and will memory address insert the end of AP chained list, then perform step c-2-5-3);
C-2-5-3). judgement
Figure DEST_PATH_IMAGE108
content be whether empty, if be sky, directly return to step b-1); Empty if,, according to the frame content, obtain
Figure 988714DEST_PATH_IMAGE108
value, then return to step b-1);
C-3). the subtype of judgement control frame, if energy-conservation poll is searched target MAC (Media Access Control) address based on Hash table
Figure 281155DEST_PATH_IMAGE084
corresponding state set
Figure 449837DEST_PATH_IMAGE086
, execution step c-3-1); If other subtype, return to step b-1);
C-3-1). judgement
Figure 206440DEST_PATH_IMAGE092
whether set up, if set up, perform step c-3-4); If be false, perform step c-3-2);
C-3-2). judgement
Figure 858001DEST_PATH_IMAGE088
whether set up, if be false, perform step c-3-3); If set up, first arrange
Figure 716367DEST_PATH_IMAGE090
, then perform step c-3-3);
C-3-3). will
Figure 111576DEST_PATH_IMAGE062
memory address insert its father node in
Figure DEST_PATH_IMAGE110
the end of sequence, and sequence
Figure DEST_PATH_IMAGE112
length
Figure DEST_PATH_IMAGE114
increase by 1; And arrange
Figure 59996DEST_PATH_IMAGE092
, execution step c-3-4);
C-3-4). judgement whether set up, if be false, return to step b-1); If set up, arrange , and will
Figure 807524DEST_PATH_IMAGE086
memory address insert the end of AP chained list, return to step b-1);
C-4). based on Hash table, search target MAC (Media Access Control) address corresponding state set
Figure 258282DEST_PATH_IMAGE086
; The transmission direction of judgement Frame, if uplink frame performs step c-4-1); If it performs step c-4-2 for downlink frame);
C-4-1). judgement
Figure 260873DEST_PATH_IMAGE092
whether set up, if set up, perform step c-4-1-3); If be false, perform step c-4-1-1);
C-4-1-1). judgement
Figure 846575DEST_PATH_IMAGE088
whether set up, if be false, perform step c-4-1-2); If set up, first arrange
Figure 10840DEST_PATH_IMAGE090
, then perform step c-4-1-2);
C-4-1-2). will memory address insert its father node
Figure 484513DEST_PATH_IMAGE086
in
Figure 924722DEST_PATH_IMAGE110
the end of sequence, and sequence
Figure 338517DEST_PATH_IMAGE112
length
Figure 864176DEST_PATH_IMAGE114
increase by 1; Arrange
Figure 208570DEST_PATH_IMAGE092
, execution step c-4-1-3);
C-4-1-3). judgement
Figure 18132DEST_PATH_IMAGE100
whether set up, if be false, return to step b-1); If set up, arrange , and will
Figure 802734DEST_PATH_IMAGE086
memory address insert the end of AP chained list, return to step b-1);
C-4-2). judgement whether set up, if be false, perform step c-4-2-1); If set up, arrange
Figure 850773DEST_PATH_IMAGE094
, and will
Figure 590058DEST_PATH_IMAGE062
memory address insert the end of AP chained list, execution step c-4-2-1);
C-4-2-1). judgement whether set up, if set up, return to step b-1); If be false, perform step c-4-2-2);
C-4-2-2). judgement
Figure 25774DEST_PATH_IMAGE100
whether set up, if be false, perform step c-4-2-3); If set up, first arrange
Figure 232764DEST_PATH_IMAGE102
, then perform step c-4-2-3);
C-4-2-3). will
Figure 408531DEST_PATH_IMAGE086
memory address insert its father node in the end of sequence, and sequence
Figure DEST_PATH_IMAGE116
length
Figure 760512DEST_PATH_IMAGE114
increase by 1; Arrange
Figure 356447DEST_PATH_IMAGE104
, return to step b-1).
5. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user according to claim 1 and 2, is characterized in that, establishes
Figure DEST_PATH_IMAGE118
for the label of AP chained list interior nodes, for in the AP chained list the AP state set of individual node institute index, for
Figure DEST_PATH_IMAGE124
the label of sequence interior element,
Figure DEST_PATH_IMAGE126
for
Figure 469076DEST_PATH_IMAGE124
in sequence the
Figure 956384DEST_PATH_IMAGE122
the STA state set of individual element institute index,
Figure DEST_PATH_IMAGE128
maximum average statistical for signal strength signal intensity RSSI; In the topological tree list, each AP state set is positioned at father node list layer, each first kind STA state set is positioned at the child node list layer under corresponding A P, the data item that the AP node shows is MAC Address, channel number, SSID, RSSI average statistical and the sum of catching radio frames, and the data item that the STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; Steps d) processing that the interior state set of the described WLAN of utilization topological structure is periodically updated the topological tree list comprises the following steps:
D-1). obtain the AP node sum in existing topological tree list
Figure DEST_PATH_IMAGE130
;
D-2). initial value is set, and the position of reading of AP chained list is set to the linked list head node, and the AP nodal scheme is set
Figure 473953DEST_PATH_IMAGE118
initial value be " 0 ", the maximum average statistical of RSSI
Figure 373776DEST_PATH_IMAGE128
initial value be-90, the execution step d-3);
D-3). whether the judgement traversal completes, and judges whether the AP chained list has traveled through, if complete, performs step d-16); If do not traveled through, performed step d-4);
D-4). a node is read in the pre-treatment position of working as at the AP chained list, and arranges
Figure DEST_PATH_IMAGE132
; Obtain the AP state set
Figure 752936DEST_PATH_IMAGE120
mAC Address, channel number, SSID and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step d-5 based on singular point filtering and average value processing method);
D-5). compare label
Figure 851342DEST_PATH_IMAGE118
with AP node sum
Figure 477495DEST_PATH_IMAGE130
, judgement whether set up, if set up, execution step d-6); If be false, perform step d-7);
D-6). compare the AP state set
Figure 972936DEST_PATH_IMAGE120
with in the topological tree list
Figure 342738DEST_PATH_IMAGE118
the corresponding data item of individual AP node, upgraded for inconsistent data item; And obtain topological tree list the child node sum of individual AP node , execution step d-8);
D-7). utilize
Figure 109017DEST_PATH_IMAGE120
build new node, add the end of AP list in existing topological tree list, execution step d-8);
D-8). initialization , will
Figure 688083DEST_PATH_IMAGE124
the element numerals of sequence be set to " 1 ", execution step d-9);
D-9). the judgement sequence
Figure 978305DEST_PATH_IMAGE124
in all elements whether read completely, if read completely, perform step d-3); If do not read completely, perform step d-10);
D-10). read sequence
Figure 136753DEST_PATH_IMAGE124
?
Figure 661407DEST_PATH_IMAGE122
individual element, obtain the STA state set
Figure 792174DEST_PATH_IMAGE126
mAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI based on singular point filtering and average value processing method
Figure DEST_PATH_IMAGE138
, execution step d-11);
D-11). signal strength signal intensity relatively, compares
Figure 993348DEST_PATH_IMAGE138
with
Figure 753275DEST_PATH_IMAGE128
size, if
Figure DEST_PATH_IMAGE140
, perform step d-12); If
Figure DEST_PATH_IMAGE142
, with with record
Figure 954055DEST_PATH_IMAGE118
with
Figure 939329DEST_PATH_IMAGE122
value, and arrange
Figure DEST_PATH_IMAGE148
, execution step d-12);
D-12). judgement whether set up, if set up, execution step d-13); If be false, perform step d-14);
D-13). judgement
Figure DEST_PATH_IMAGE150
whether set up, if set up, compare
Figure 632663DEST_PATH_IMAGE126
with topological tree list
Figure 686069DEST_PATH_IMAGE118
of individual AP node
Figure 151948DEST_PATH_IMAGE122
the corresponding data item of individual child node, and inconsistent data item is upgraded to execution step d-15); If be false, perform step d-14);
D-14). utilize
Figure 632608DEST_PATH_IMAGE126
build new node, add topological tree list the
Figure 252945DEST_PATH_IMAGE118
the end of the child node list of individual AP node, execution step d-15);
D-15). arrange
Figure DEST_PATH_IMAGE152
, redirect execution step d-9);
D-16). in the topological tree list the under individual AP node
Figure 47737DEST_PATH_IMAGE146
individual STA node, be this
Figure 512348DEST_PATH_IMAGE036
there is the first kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
6. the catching method of the MAC Address for WLAN (wireless local area network) specific objective user according to claim 1 and 2, is characterized in that, establishes
Figure 292085DEST_PATH_IMAGE122
for the label of the Equations of The Second Kind STA state set that finds in Hash table,
Figure DEST_PATH_IMAGE154
maximum average statistical for signal strength signal intensity RSSI; In not associated list, the data item that each STA node shows is MAC Address, RSSI average statistical and the sum of catching radio frames; Step e) the described processing that utilizes the Equations of The Second Kind STA state set in Hash table to be periodically updated not associated list comprises the following steps:
E-1). obtain the STA node sum in existing not associated list ; To read position and be made as the original position of Hash table; Label
Figure DEST_PATH_IMAGE156
, maximum RSSI average statistical
Figure DEST_PATH_IMAGE158
;
E-2). whether judgement comprises the conflict chained list and has traveled through at interior Hash table, if complete, performs step e-7); If do not traveled through, performed step e-3);
E-3). a state set is read in the pre-treatment position of working as at Hash table
Figure 937885DEST_PATH_IMAGE002
, judge whether this state set meets
Figure 573397DEST_PATH_IMAGE046
and
Figure 840430DEST_PATH_IMAGE044
condition, if do not meet, it does not belong to Equations of The Second Kind STA state set, redirect execution step e-2); If meet, perform step e-4);
E-4). arrange
Figure 101647DEST_PATH_IMAGE152
; Obtain the STA state set
Figure 770526DEST_PATH_IMAGE126
mAC Address and catch the sum of radio frames, and calculate the average statistical of its RSSI, execution step e-5 based on singular point filtering and average value processing method);
E-5). signal strength signal intensity relatively, compares
Figure 75474DEST_PATH_IMAGE138
with
Figure 829803DEST_PATH_IMAGE154
size, if
Figure DEST_PATH_IMAGE160
, perform step e-6); If
Figure DEST_PATH_IMAGE162
, with record
Figure 231146DEST_PATH_IMAGE122
value, and arrange
Figure DEST_PATH_IMAGE164
, execution step e-6);
E-6). judgement
Figure 769312DEST_PATH_IMAGE150
whether set up, if set up, compare
Figure 10938DEST_PATH_IMAGE126
with not associated list
Figure 613957DEST_PATH_IMAGE122
the corresponding data item of individual STA node, and inconsistent data item is upgraded to execution step e-2); If be false, utilize
Figure 991849DEST_PATH_IMAGE126
build new node, add the end of existing not associated list, execution step e-2);
E-7). judgement whether set up, if be false, perform step e-8); If set up, the existing not associated list end of deletion individual STA node, execution step e-8); After Hash table has traveled through, here
Figure 574431DEST_PATH_IMAGE122
recorded the sum of the Equations of The Second Kind STA state set found;
E-8). of not associated list
Figure 981141DEST_PATH_IMAGE146
individual STA node, be this
Figure 213540DEST_PATH_IMAGE042
there is the Equations of The Second Kind STA state set of maximum RSSI average statistical in cycle, it is carried out to mark.
7. according to claim 1,5, the 6 described catching methods of the MAC Address for WLAN (wireless local area network) specific objective user, it is characterized in that, establish
Figure DEST_PATH_IMAGE168
for the STA node of institute's mark in the STA node of institute's mark in the topological tree list and not associated list all keeps the stable time, when any in both changes,
Figure 798236DEST_PATH_IMAGE168
all reset to 0; The described processing that the specific objective user's MAC address is judged of step f) comprises the following steps:
F-1). judge stabilization time whether reach threshold value
Figure DEST_PATH_IMAGE170
if reach
Figure 5281DEST_PATH_IMAGE170
, perform step f-2); If do not reach, random wait performs step f-1 again after a period of time);
F-2). relatively
Figure 357765DEST_PATH_IMAGE128
with
Figure 362630DEST_PATH_IMAGE154
the size of value, if
Figure DEST_PATH_IMAGE172
, by the STA node determination of institute's mark in the topological tree list, be specific objective, return to its MAC Address; If
Figure DEST_PATH_IMAGE174
, by the STA node determination of institute's mark in not associated list, be specific objective, return to its MAC Address.
CN201310135442.2A 2013-04-18 2013-04-18 A kind of MAC Address catching method for WLAN (wireless local area network) specific objective user Active CN103259878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310135442.2A CN103259878B (en) 2013-04-18 2013-04-18 A kind of MAC Address catching method for WLAN (wireless local area network) specific objective user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310135442.2A CN103259878B (en) 2013-04-18 2013-04-18 A kind of MAC Address catching method for WLAN (wireless local area network) specific objective user

Publications (2)

Publication Number Publication Date
CN103259878A true CN103259878A (en) 2013-08-21
CN103259878B CN103259878B (en) 2015-09-30

Family

ID=48963567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310135442.2A Active CN103259878B (en) 2013-04-18 2013-04-18 A kind of MAC Address catching method for WLAN (wireless local area network) specific objective user

Country Status (1)

Country Link
CN (1) CN103259878B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101149A (en) * 2015-07-28 2015-11-25 福建师范大学 Neighbor detection method based on wireless AP
CN107734504A (en) * 2017-11-01 2018-02-23 深圳汇生通科技股份有限公司 To the realization method and system of mobile device MAC Address collection in a kind of WIFI
CN108668227A (en) * 2018-04-27 2018-10-16 广州仁星数位时代科技有限公司 A kind of characteristic recognition method, device and server based on block chain
CN110225557A (en) * 2018-03-02 2019-09-10 华为技术有限公司 A kind of communication means and device based on Internet of Things
CN110267299A (en) * 2019-07-04 2019-09-20 南京茂毓通软件科技有限公司 The MAC Address catching method of WIFI terminal
CN111278036A (en) * 2018-12-04 2020-06-12 山东快发网络科技有限公司 Method and device for collecting MAC address
WO2020125174A1 (en) * 2018-12-19 2020-06-25 杭州光启人工智能研究院 Data collection and processing method and system for sniffing device, and storage medium and processor
CN111786811A (en) * 2020-05-25 2020-10-16 福建中锐电子科技有限公司 Portable on-site electronic data evidence obtaining terminal and device
CN111914244A (en) * 2020-07-31 2020-11-10 深圳力维智联技术有限公司 Data processing method, device and computer readable storage medium
CN113360783A (en) * 2021-06-21 2021-09-07 上海哔哩哔哩科技有限公司 User online list updating method and device and computer equipment
CN113592413A (en) * 2021-09-30 2021-11-02 浙江宇视科技有限公司 Intelligent scheduling method and device based on multi-user cooperation, electronic equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860872A (en) * 2009-04-07 2010-10-13 王冬冬 Wireless local area network AP positioning method
US20120294231A1 (en) * 2011-05-17 2012-11-22 Keir Finlow-Bates Wi-fi access point characteristics database

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101860872A (en) * 2009-04-07 2010-10-13 王冬冬 Wireless local area network AP positioning method
US20120294231A1 (en) * 2011-05-17 2012-11-22 Keir Finlow-Bates Wi-fi access point characteristics database

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JIE YANG等: "Detection and Localization of Multiple Spoofing Attackers in Wireless Networks", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101149A (en) * 2015-07-28 2015-11-25 福建师范大学 Neighbor detection method based on wireless AP
CN105101149B (en) * 2015-07-28 2018-05-04 福建师范大学 A kind of neighbour's detection method based on wireless aps
CN107734504A (en) * 2017-11-01 2018-02-23 深圳汇生通科技股份有限公司 To the realization method and system of mobile device MAC Address collection in a kind of WIFI
CN110225557B (en) * 2018-03-02 2022-04-22 华为技术有限公司 Communication method and device based on Internet of things
CN110225557A (en) * 2018-03-02 2019-09-10 华为技术有限公司 A kind of communication means and device based on Internet of Things
US11316630B2 (en) 2018-03-02 2022-04-26 Huawei Technologies Co., Ltd. Internet of things-based communication method and apparatus
CN108668227A (en) * 2018-04-27 2018-10-16 广州仁星数位时代科技有限公司 A kind of characteristic recognition method, device and server based on block chain
CN111278036B (en) * 2018-12-04 2024-01-09 京东科技信息技术有限公司 Method and device for acquiring MAC address
CN111278036A (en) * 2018-12-04 2020-06-12 山东快发网络科技有限公司 Method and device for collecting MAC address
WO2020125174A1 (en) * 2018-12-19 2020-06-25 杭州光启人工智能研究院 Data collection and processing method and system for sniffing device, and storage medium and processor
CN110267299B (en) * 2019-07-04 2022-08-09 南京茂毓通软件科技有限公司 MAC (media Access control) address capturing method of WIFI (Wireless Fidelity) terminal
CN110267299A (en) * 2019-07-04 2019-09-20 南京茂毓通软件科技有限公司 The MAC Address catching method of WIFI terminal
CN111786811A (en) * 2020-05-25 2020-10-16 福建中锐电子科技有限公司 Portable on-site electronic data evidence obtaining terminal and device
CN111786811B (en) * 2020-05-25 2022-07-08 福建中锐电子科技有限公司 Portable on-site electronic data evidence obtaining terminal and device
CN111914244A (en) * 2020-07-31 2020-11-10 深圳力维智联技术有限公司 Data processing method, device and computer readable storage medium
CN113360783A (en) * 2021-06-21 2021-09-07 上海哔哩哔哩科技有限公司 User online list updating method and device and computer equipment
CN113592413A (en) * 2021-09-30 2021-11-02 浙江宇视科技有限公司 Intelligent scheduling method and device based on multi-user cooperation, electronic equipment and medium

Also Published As

Publication number Publication date
CN103259878B (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN103259878B (en) A kind of MAC Address catching method for WLAN (wireless local area network) specific objective user
CN104980885B (en) A kind of data processing system and method towards WIFI detection identifications
WO2014108765A1 (en) Classifying stored information about wlan access points
AU2012253378B2 (en) Managing network interaction for devices
US8862154B2 (en) Location measuring method and apparatus using access point for wireless local area network service
US20170180940A1 (en) System and method for geography-based correlation of cellular and wlan identifiers
Ibrahim et al. Enabling wide deployment of GSM localization over heterogeneous phones
CN103686818A (en) Simulation test method and equipment
CN104185139A (en) Fingerprint matching-based wireless positioning method and device
CN107071708B (en) Passive wireless signal acquisition and positioning method for intelligent mobile terminal
AbdelAziz et al. The diversity and scale matter: Ubiquitous transportation mode detection using single cell tower information
King et al. On-demand fingerprint selection for 802.11-based positioning systems
CN106060862A (en) Positioning reference data acquiring and updating method and system
KR101545562B1 (en) Method and Apparatus for Positioning by Using Round Trip Time
WO2014108757A1 (en) Obtaining information for radio channel modeling
CN106358287B (en) A kind of intelligent terminal Passive Location based on Probe Request frame
Rahimi et al. Indoor geo-fencing and access control for wireless networks
CN105873183B (en) A kind of method for searching network and user equipment
CN105764153A (en) Signature sequence detection method and apparatus of uplink random access
WO2015084154A1 (en) A system and method for locating a mobile device
Elbakly et al. A calibration-free RF localization system
Urwan et al. Position estimation in mixed indoor-outdoor environment using signals of opportunity and deep learning approach
Hoang et al. Passive indoor localization with WiFi fingerprints
CN106550329A (en) The detection process method and device of mobile terminal
CN107948989A (en) A kind of computational methods and device of mobile terminal networking duration

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 250014 Ji'nan Province, Shandong Province, Lixia District, Department of road, No. 19, Shandong Computing Center

Applicant after: SHANDONG COMPUTER SCIENCE CENTER

Address before: 250014 Shandong computing center, No. 19 ASTRI Road, Shandong, Ji'nan

Applicant before: Shandong Prov. Computing Center

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SHANDONG PROV. COMPUTING CENTER TO: SHANDONG COMPUTING CENTER (NATIONAL SUPER COMPUTING JI NAN CENTER)

C14 Grant of patent or utility model
GR01 Patent grant