CN107920054B - Data transmission method and related equipment thereof - Google Patents

Data transmission method and related equipment thereof Download PDF

Info

Publication number
CN107920054B
CN107920054B CN201710684806.0A CN201710684806A CN107920054B CN 107920054 B CN107920054 B CN 107920054B CN 201710684806 A CN201710684806 A CN 201710684806A CN 107920054 B CN107920054 B CN 107920054B
Authority
CN
China
Prior art keywords
sending
mic
end device
receiving end
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710684806.0A
Other languages
Chinese (zh)
Other versions
CN107920054A (en
Inventor
丁志明
庞高昆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN107920054A publication Critical patent/CN107920054A/en
Application granted granted Critical
Publication of CN107920054B publication Critical patent/CN107920054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses a data transmission method and related equipment thereof, which are used for protecting the position privacy of a user. The method in the embodiment of the application comprises the following steps: receiving end equipment receives a protected sending request P-RTS frame sent by sending end equipment, wherein the P-RTS frame comprises: a first message integrity code, MIC; the receiving end equipment judges the validity of the sending end equipment according to the first MIC; and if the receiving end equipment determines that the sending end equipment is legal, sending a Clear To Send (CTS) frame to the sending end equipment.

Description

Data transmission method and related equipment thereof
The present application claims priority of chinese patent application having application number 201610890961.3 entitled "a communication method for protecting privacy" filed on 11/10/2016 and priority of chinese patent application having application number 201710218342.4 entitled "a communication method for protecting privacy" filed on 05/04/2017, which are incorporated herein by reference in their entireties.
Technical Field
The present application relates to the field of communications, and in particular, to a data transmission method and related devices.
Background
Wireless Fidelity (WiFi) is a contention-based Wireless communication method. Therefore, when the WiFi device transmits data, collision is easy to occur, and further waste of channel resources is easy to be caused. The prior art addresses this problem in the following manner. Before sending data to the receiving end device, the sending end device may Send a Request To Send (RTS) frame to the receiving end device, where the RTS frame carries a receiving address (Media Access Control (MAC) address of the receiving end device) and a sending address (MAC address of the sending end device). And if the receiving end equipment establishes a connection relation with at least one sending end equipment, the receiving end equipment determines whether to receive the RTS frame according to the receiving address in the RTS frame. After receiving the RTS frame, the receiving device may Send a Clear To Send (CTS) frame to the transmitting device. After the RTS frame and the CTS frame are successfully interacted, the sending-end device may send a long frame, such as a data frame or a management frame, through a channel occupied by the RTS frame and the CTS frame, so as to ensure that the long frame can be successfully sent. Because the RTS frame and the CTS frame are short in length, even if collision occurs, the waste of channel resources is small.
In the prior art, the probe device can more easily intercept the RTS frame sent by the sending-end device that has established a connection relationship with the receiving-end device according to the above RTS frame and CTS frame interaction process. The probing device can then replay the RTS frame. After receiving the RTS frame, the receiving end device determines that the RTS frame is sent by the sending end device that establishes a connection relationship with itself. Based on this, the receiving end device replies to the CTS frame. Once the probing device listens to the CTS frame sent by the receiving device, the probing device can determine that the user holding the receiving device is nearby, thereby revealing the location privacy of the user.
Disclosure of Invention
The embodiment of the application provides a data transmission method and related equipment thereof, which are used for protecting the position privacy of a user.
A first aspect of an embodiment of the present application provides a data transmission method, which specifically includes: receiving end equipment receives a Protected Request To Send (P-RTS) frame sent by sending end equipment, wherein the P-RTS frame comprises: a first Message Integrity Code (MIC); the receiving end equipment judges the validity of the sending end equipment according to the first MIC; and if the receiving end equipment determines that the sending end equipment is legal, sending a CTS frame to the sending end equipment. In the embodiment of the application, the receiving end device does not actively send a message, receives the P-RTS frame from the sending end device, replies the CIS frame to the sending end device after judging that the sending end device is legal, and transmits data after the P-RTS/CTS interaction is successful, so that the situation that the detected device (illegal sending end device) detects that the receiving end device is nearby is prevented, and the user position privacy is protected.
In a possible design, in a first implementation manner of the first aspect of the embodiment of the present application, the P-RTS frame further includes: the first change value, the judging, by the receiving end device according to the first MIC, of the validity of the sending end device includes: the receiving end equipment judges whether the P-RTS frame is fresh or not according to the first change value; the receiving terminal equipment judges whether the first MIC is correct or not; if the P-RTS frame is fresh and the first MIC is correct, the receiving end equipment determines that the sending end equipment is legal; and if the P-RTS frame is not fresh and/or the first MIC is incorrect, the receiving end equipment determines that the sending end equipment is illegal. This embodiment illustrates how to determine the validity of a sending device, which increases the realizability and integrity of the embodiments of the present application.
In a possible design, in a second implementation manner of the first aspect of the embodiment of the present application, the determining, by the receiving end device, whether the P-RTS frame is fresh according to the first change value includes: the receiving end equipment acquires the sending end equipment identification carried by the P-RTS frame; if the receiving end equipment determines that the first change value meets a preset change rule according to the first change value and a second change value, determining that the P-RTS frame is fresh, wherein the second change value is a change value which is recorded by the receiving end equipment and is sent last time by the sending end equipment and corresponds to the identification of the sending end equipment; and if the receiving end equipment determines that the first change value does not meet a preset change rule according to the first change value and the second change value, determining that the P-RTS frame is not fresh. The embodiment details how the receiving end device judges whether the P-RTS frame is fresh according to the first change value, so that the steps are more complete, and the operability of the embodiment of the application is improved.
In a possible design, in a third implementation manner of the first aspect of the embodiment of the present application, the determining, by the receiving end device, whether the first MIC is correct includes: the receiving end equipment determines a second MIC according to a field in the P-RTS frame through a session key, wherein the session key corresponds to the identification of the sending end equipment; if the first MIC and the second MIC are the same, the receiving end equipment determines that the first MIC is correct; and if the first MIC is not the same as the second MIC, the receiving end equipment determines that the first MIC is incorrect. The embodiment refines how the receiving end equipment judges whether the first MIC is correct or not, so that the steps are more complete, and the operability of the embodiment of the application is improved.
In a possible design, in a fourth implementation manner of the first aspect of the embodiment of the present application, before the receiving end device determines validity of the sending end device according to the first MIC, the method further includes: the receiving end equipment receives a first change value sent by the sending end equipment; wherein, the receiving end equipment judges the validity of the sending end equipment according to the first MIC and comprises the following steps: the receiving end equipment determines a second MIC according to a field in the P-RTS frame and the first change value through a session key, wherein the session key corresponds to the sending end equipment identifier; if the first MIC is the same as the second MIC, the receiving end equipment determines that the sending end equipment is legal; and if the first MIC is different from the second MIC, the receiving end equipment determines that the sending end equipment is illegal. In this embodiment, another situation that the receiving end device determines the validity of the sending end device according to the first MIC is introduced, which enriches embodiments of the present application.
In a possible design, in a fifth implementation manner of the first aspect of the embodiment of the present application, before the receiving end device receives a P-RTS frame sent by a sending end device, the method further includes: the receiving end equipment receives a wake-up frame sent by the sending end equipment, wherein the wake-up frame is used for waking up a wireless communication interface transceiver of the receiving end equipment; the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver. This embodiment shows that before the receiving end device receives the P-RTS frame sent by the sending end device, the receiving end device also receives the wakeup frame sent by the sending end device, so that the steps are more complete, and the operability of the embodiment of the present application is increased.
A second aspect of the embodiments of the present application provides a data transmission method, which specifically includes: sending a protected sending request P-RTS frame to a receiving end device by a sending end device, wherein the P-RTS frame comprises: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment; and if the sending end equipment is legal, the sending end equipment receives a Clear To Send (CTS) frame sent by the receiving end equipment. In the embodiment of the application, the receiving end device does not actively send a message, receives the P-RTS frame from the sending end device, replies the CIS frame to the sending end device after judging that the sending end device is legal, and transmits data after the P-RTS/CTS interaction is successful, so that the situation that the detected device (illegal sending end device) detects that the receiving end device is nearby is prevented, and the user position privacy is protected.
In one possible design, in a first implementation of the second aspect of the embodiment of the present application,
the P-RTS frame further includes: a first change value, the first change value being used to determine whether the frame is fresh. This embodiment illustrates that the P-RTS frame further includes the first variation value, and illustrates the effect of the first variation value, which increases the operability of the embodiment of the present application.
In a possible design, in a second implementation manner of the second aspect of the embodiment of the present application, the method further includes: and the sending end equipment sends the first change value to the receiving end equipment so that the receiving end equipment determines a second MIC elimination result according to the first change value and a field in the P-RTS frame through a session key, wherein the session key corresponds to the identifier of the sending end equipment. This embodiment illustrates that the sending end device sends the first variation value to the receiving end device, and the specific implementation manner of the present application is added.
In a possible design, in a third implementation manner of the second aspect of the embodiment of the present application, before the sending-end device sends a P-RTS frame to a receiving-end device, the method further includes: the sending end equipment sends a wake-up frame to the receiving end equipment, and the wake-up frame is used for waking up a wireless communication interface transceiver of the receiving end equipment; the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver. In this embodiment, a step of sending the wakeup frame to the receiving end device by the sending end device is added, so that the steps are more complete and the operability of the embodiment of the present application is improved under the condition that the receiving end device does not have message transmission.
A third aspect of the embodiments of the present application provides a receiving end device, which specifically includes:
a first receiving unit, configured to receive a protected transmission request P-RTS frame sent by a sending end device, where the P-RTS frame includes: a first message integrity code, MIC;
the judging unit is used for judging the validity of the sending terminal equipment according to the first MIC;
a first sending unit, configured to send a clear to send CTS frame to the sending-end device when it is determined that the sending-end device is legal.
In the embodiment of the application, the receiving end device does not actively send a message, receives the P-RTS frame from the sending end device, replies the CIS frame to the sending end device after judging that the sending end device is legal, and transmits data after the P-RTS/CTS interaction is successful, so that the situation that the detected device (illegal sending end device) detects that the receiving end device is nearby is prevented, and the user position privacy is protected.
In one possible design, in a first implementation form of the third aspect of the embodiment of the present application,
the P-RTS frame further includes: a first variation value, the judging unit including:
the first judgment subunit is used for judging whether the P-RTS frame is fresh or not according to the first change value;
the second judgment subunit is used for judging whether the first MIC is correct or not;
a first determining subunit, configured to determine that the sending-end device is legal when the P-RTS frame is fresh and the first MIC is correct;
and the second determining subunit is used for determining that the sending-end equipment is illegal when the P-RTS frame is not fresh and/or the first MIC is incorrect.
This embodiment illustrates how to determine the validity of a sending device, which increases the realizability and integrity of the embodiments of the present application.
In a possible design, in a second implementation manner of the third aspect of the embodiment of the present application, the first determining subunit includes:
an obtaining module, configured to obtain a device identifier at a sending end, where the device identifier is carried by the P-RTS frame;
a first determining module, configured to determine that the P-RTS frame is fresh when it is determined that the first change value satisfies a preset change rule according to the first change value and a second change value, where the second change value is a change value, recorded by the receiving end device, that is sent last time by the sending end device and corresponding to the sending end device identifier;
and the second determining module is used for determining that the P-RTS frame is not fresh when the first change value is determined to not meet a preset change rule according to the first change value and the second change value.
The embodiment details how the receiving end device judges whether the P-RTS frame is fresh according to the first change value, so that the steps are more complete, and the operability of the embodiment of the application is improved.
In a possible design, in a third implementation manner of the third aspect of the embodiment of the present application, the second determining subunit includes:
a third determining module, configured to determine a second MIC according to a field in the P-RTS frame by using a session key, where the session key corresponds to the sender device identifier;
a fourth determining module to determine that the first MIC is correct when the first MIC is the second MIC;
a fifth determining module to determine that the first MIC is incorrect when the first MIC is not the same as the second MIC.
According to the embodiment, how the receiving end equipment judges the legality of the sending end equipment according to the first MIC is refined, so that the steps are more complete, and the operability of the embodiment of the application is improved.
In a possible design, in a fourth implementation manner of the third aspect of the embodiment of the present application, the receiving end device further includes:
a second receiving unit, configured to receive the first variation value sent by the sending end device;
the judging unit includes:
a third determining subunit, configured to determine, by using a session key, a second MIC according to a field in the P-RTS frame and the first change value, where the session key corresponds to the sending-end device identifier;
a fourth determining subunit, configured to determine that the sending-end device is legal when the first MIC is the same as the second MIC;
and a fifth determining subunit, configured to determine that the sending-end device is illegal when the first MIC is different from the second MIC.
In this embodiment, another situation that the receiving end device determines the validity of the sending end device according to the first MIC is introduced, which enriches embodiments of the present application.
In a possible design, in a fifth implementation manner of the third aspect of the embodiment of the present application, the receiving end device further includes:
a third receiving unit, configured to receive a wake-up frame sent by the sending end device, where the wake-up frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
This embodiment shows that before the receiving end device receives the P-RTS frame sent by the sending end device, the receiving end device also receives the wakeup frame sent by the sending end device, so that the steps are more complete, and the operability of the embodiment of the present application is increased.
A fourth aspect of the embodiments of the present application provides a sending-end device, including:
a first sending unit, configured to send a protected send request P-RTS frame to a receiving device, where the P-RTS frame includes: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment;
a first receiving unit, configured to receive a clear to send CTS frame sent by the receiving end device when the sending end device is legal.
In the embodiment of the application, the receiving end device does not actively send a message, receives the P-RTS frame from the sending end device, replies the CIS frame to the sending end device after judging that the sending end device is legal, and transmits data after the P-RTS/CTS interaction is successful, so that the situation that the detected device (illegal sending end device) detects that the receiving end device is nearby is prevented, and the user position privacy is protected.
In one possible design, in a first implementation form of the fourth aspect of the embodiment of the present application,
the P-RTS frame further includes: a first change value, the first change value being used to determine whether the frame is fresh.
This embodiment illustrates that the P-RTS frame further includes the first variation value, and illustrates the effect of the first variation value, which increases the operability of the embodiment of the present application.
In a possible design, in a second implementation manner of the fourth aspect of the embodiment of the present application, the sending-end device further includes:
a second sending unit, configured to send the first change value to the receiving end device, so that the receiving end device determines, according to the first change value and a field in the P-RTS frame, a second MIC elimination according to a session key, where the session key corresponds to an identifier of the sending end device.
This embodiment illustrates that the sending end device sends the first variation value to the receiving end device, and the specific implementation manner of the present application is added.
In a possible design, in a third implementation manner of the fourth aspect of the embodiment of the present application, the sending end device further includes:
a third sending unit, configured to send a wakeup frame to the receiving end device, where the wakeup frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
In this embodiment, a step of sending the wakeup frame to the receiving end device by the sending end device is added, so that the steps are more complete and the operability of the embodiment of the present application is improved under the condition that the receiving end device does not have message transmission.
Yet another aspect of the present application provides a computer-readable storage medium having stored therein instructions, which when executed on a computer, cause the computer to perform the method of the above-described aspects.
Yet another aspect of the present application provides a computer program product containing instructions which, when run on a computer, cause the computer to perform the method of the above-described aspects.
Drawings
Fig. 1 is a schematic view of an application scenario of a data transmission method in an embodiment of the present application;
fig. 2 is an interaction flowchart of a data transmission method in an embodiment of the present application;
FIG. 3 is a diagram illustrating a P-RTS frame according to an embodiment of the present application;
FIG. 4 is another interactive flowchart of a data transmission method in an embodiment of the present application;
FIG. 5 is another interactive flowchart of a data transmission method in an embodiment of the present application;
fig. 6 is a schematic diagram of an embodiment of a receiving end device in the embodiment of the present application;
fig. 7 is a schematic diagram of another embodiment of a receiving end device in the embodiment of the present application;
fig. 8 is a schematic diagram of an embodiment of a sending end device in an embodiment of the present application;
fig. 9 is a schematic diagram of another embodiment of a sending end device in an embodiment of the present application;
fig. 10 is a schematic diagram of another embodiment of a receiving end device in the embodiment of the present application;
fig. 11 is a schematic diagram of another embodiment of a sending end device in this embodiment of the present application.
Detailed Description
The embodiment of the application provides a data transmission method and related equipment thereof, which are used for protecting the position privacy of a user.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the prior art, even if a WiFi device does not actively send a message, since the identity of the sender of the message is not confirmed and the response is made after receiving a message, the WiFi device is utilized by an attacker, so that the attacker passively leaks the privacy of the user position.
In view of this, embodiments of the present application provide a data transmission method and related device, which are used to protect location privacy of a user. When the WiFi device receives data, it first needs To receive a correct P-RTS (Protected-Request To Send, P-RTS), then makes a CTS response, and then receives the data of the other party. This means that a transmission period initiated by the communicating peer must be started by a P-RTS message. The P-RTS is a control frame with integrity protection, and the short length enables a receiving end to send out a CTS frame in time after completing frame integrity authentication within a specified frame interval time, so that the P-RTS/CTS message realizes the same transmission protection as the RTS/CTS, and meanwhile, the condition that the receiving end blindly responds to expose the existence of the P-RTS/CTS message to leak the position privacy of a user is avoided. The P-RTS is added with message integrity protection information on the basis of RTS, and the number of added bytes of the message is small.
As shown in fig. 1, fig. 1 is an application scenario diagram of a data transmission method according to an embodiment of the present application, where a sending end device and a receiving end device may implement data transmission by using a WiFi technology.
Referring to fig. 2, fig. 2 is an interactive flowchart of a data transmission method according to an embodiment of the present application. The sending terminal equipment related to the method can be an intelligent terminal such as a mobile phone, a tablet personal computer, an intelligent bracelet and an intelligent watch. Similarly, the sending end device can also be an intelligent terminal such as a mobile phone, a tablet computer, an intelligent bracelet, an intelligent watch and the like. As shown in fig. 2, the method comprises the steps of:
201. and the receiving end equipment receives the P-RTS frame sent by the sending end equipment.
In this embodiment, the receiving end device may receive a P-RTS frame sent by the sending end device, where the P-RTS frame includes the first MIC. Fig. 3 is a schematic diagram of a P-RTS frame provided in fig. 3 according to an embodiment of the present application, where the P-RTS frame includes: a first MIC; the first MIC is typically 8 bytes long to ensure adequate security. Other lengths of the first MIC field, such as 4 bytes, are also possible if excessive security strength is not required. Under normal conditions, the first MICs sent by the sending end device to the receiving end device every time are different. As shown in fig. 3, the P-RTS frame further includes: a Receive Address (RA), a Transmit Address (TA), a first occupied channel time Dur1, and a Frame Check Sequence (FCS); wherein RA is the address of the receiving end device, TA is the address of the sending end device, and Dur1 indicates the time that the sending end device needs to occupy the channel to complete the communication with the receiving end device. A third device that hears the P-RTS frame cannot occupy the channel for the time indicated by Dur 1. The FCS is generated using a check algorithm on the P-RTS frame except for the FCS. The checking algorithm may be a checking algorithm adopted in the prior art, and is not described herein again. As shown in fig. 3, the frame control field in the MAC frame header also includes a number of subfields. Such as a frame type field. The frame type may be a data frame, a management frame, a control frame, etc. in IEEE 802.11. The data frames or data messages referred to in the embodiments provided herein also include management frames in IEEE 802.11. Both the RTS frame and the P-RTS frame are control frames. The frame control field further includes: a subtype field that indicates which message this is, e.g., indicating whether this is an RTS frame or a CTS frame, etc. The application needs to indicate in the subtype field that this is a P-RTS frame. Where the number above each field indicates the number of bits occupied by that field, as shown in figure 3.
202. And the receiving terminal equipment judges the validity of the sending terminal equipment according to the first MIC.
In this embodiment, after receiving end equipment receives a P-RTS frame sent by sending end equipment, the receiving end equipment determines validity of the sending end equipment according to a first MIC in the P-RTS frame.
It should be noted that there are following optional ways for the receiving end device to determine the validity of the sending end device according to the first MIC.
Optionally, in a normal case, the MIC received by the receiving end device each time should be different. Based on this, after receiving the first MIC, the receiving end device determines whether the first MIC is the same as the previously received MIC. If so, it indicates that the P-RTS frame should be a playback frame. If the difference is not the same, in order to prevent the P-RTS frame from being possibly tampered, the receiving end device first identifies the identifier of the sending end device, and the receiving end device determines the session key according to the identifier. The session key should be the session key between the sending end device and the receiving end device corresponding to the identifier. And the receiving end equipment encrypts and determines a second MIC through the session key and the received message digest of the P-RTS. Optionally, a hashing algorithm may be employed to determine the second MIC. As shown in fig. 3, generating the original content of the message digest includes: all fields in the P-RTS frame except the frame check sum MIC. And when the second MIC is the same as the first MIC, the P-RTS frame is not tampered, namely the sending end device sending the P-RTS frame is a legal device. Otherwise, the P-RTS frame is tampered, that is, the transmitting device that transmits the P-RTS frame is an illegal device.
Under normal conditions, the reason why the first MIC received by the receiving end device each time should be different is as follows: the P-RTS frame sent by the sending end device to the receiving end device will carry a first change value. Since the first change values carried by the P-RTS frame sent by the sending end device to the receiving end device each time are different, the first MICs received by the receiving end device each time should be different. Or, before sending the P-RTS frame to the receiving end device, the sending end device sends a first change value to the receiving end device, and the first change value sent each time is different, so that the receiving end device should be different in receiving the first MIC each time.
The method for making the first MIC received by the receiving end device different each time is not limited in the present application.
Optionally, the P-RTS frame further includes: a first variation value; the receiving end equipment judges whether the P-RTS frame is fresh or not according to the first change value; the receiving terminal equipment judges whether the first MIC is correct or not; if the P-RTS frame is fresh and the first MIC is correct, the receiving end equipment determines that the sending end equipment is legal; otherwise, the receiving end equipment determines that the sending end equipment is illegal.
Wherein, the receiving end equipment judges whether the P-RTS frame is fresh according to the first change value, and the method comprises the following steps: the method comprises the steps that a receiving end device obtains an identification of a sending end device carried by a P-RTS frame; the receiving end equipment determines a second change value which is sent by the sending end equipment before and corresponds to the identification of the sending end equipment; if the receiving end equipment determines that the first change value meets a preset change rule according to the first change value and the second change value, determining that the P-RTS frame is fresh; otherwise, determining that the P-RTS frame is not fresh.
The preset variation rule may be a monotone increasing variation or a monotone decreasing variation, or other variation rules. This is not limited by the present application. For example: assuming that the first variation value specified for each transmission is to add 1 to the second variation value previously transmitted, when the second variation value in the P-RTS frame successfully received last time by the receiving-end device is 99, the first variation value transmitted this time should be 100. Alternatively, the first variation value in the P-RTS frame allowed to be successfully received may be some other value slightly larger than 100, such as 101, 102, etc., considering that the receiving-end device may miss a certain P-RTS frame or receive failure. In this case, the receiving end device also considers that the first variation value satisfies the preset variation rule. If the first change value in the received P-RTS frame is 97 or 80, etc., because it is smaller than the change value 100 in the previously received P-RTS frame, the first change value is considered not to satisfy the preset change rule. I.e. the P-RTS frame received by the receiving end device is not fresh. The receiving end device further determines that the sending end device is illegal, that is, the sending end device is a detection device.
If the receiving end equipment determines that the received P-RTS frame is fresh, the receiving end equipment determines a second MIC according to a field in the P-RTS frame through a session key of the sending end equipment corresponding to the identifier of the sending end equipment; if the first MIC is the same as the second MIC, the receiving end equipment determines that the sending end equipment is legal; otherwise, the receiving end equipment determines that the sending end equipment is illegal.
Specifically, the receiving end device identifies an identifier of the sending end device, and the receiving end device determines the session key according to the identifier. The session key should be the session key between the sending end device and the receiving end device corresponding to the identifier. And the receiving end equipment encrypts and determines a second MIC through the session key and the received message digest of the P-RTS. Optionally, a hashing algorithm may be employed to determine the second MIC. Of course any encryption algorithm provided by the prior art may be used. This is not limited by the present application. As shown in fig. 3, generating the original content of the message digest includes: all fields in the P-RTS frame except the frame check sum MIC. And when the second MIC is the same as the first MIC, the P-RTS frame is not tampered, namely the sending end device sending the P-RTS frame is a legal device. Otherwise, the P-RTS frame is tampered, that is, the transmitting device that transmits the P-RTS frame is an illegal device.
The optional mode three: before step 202, this embodiment further includes: receiving end equipment receives a first change value sent by sending end equipment; step 202 comprises: the receiving end equipment determines a second MIC according to the first change value and a field in the P-RTS frame through a session key of the sending end equipment corresponding to the identifier of the sending end equipment; if the first MIC is the same as the second MIC, the receiving end equipment determines that the sending end equipment is legal, otherwise, the receiving end equipment determines that the sending end equipment is illegal.
And the receiving end equipment determines that the second MIC is the same as the method adopted by the second mode according to the first change value and the field in the P-RTS frame, and the details are not repeated here.
Further, the present application is not limited to the length of the first variation value, and generally, the longer the length of the first variation value is, the more attack of the probe device can be prevented.
203. And if the receiving end equipment determines that the sending end equipment is legal, sending a CTS frame to the sending end equipment.
In this embodiment, if the receiving end device determines that the sending end device is legal according to the first MIC sent by the sending end device, a CTS frame is sent to the sending end device. On the contrary, if the receiving end device determines that the sending end device is illegal, the CTS frame is not sent to the sending end device. Thereby preventing the privacy of the location of the user holding the sink device from being compromised.
Optionally, the CTS frame carries the MAC address of the sender device and a time Dur2 of occupying a channel required by the receiver device to complete communication with the sender device, where the Dur2 is obtained by subtracting a transmission time of the CTS frame and a Short Interframe Space (SIFS) from Dur 1.
Optionally, after the sending end device sends the P-RTS frame, the sending end device receives, through the wireless communication interface, a CTS frame sent by the receiving end device to the sending end device within a predetermined SIFS, and then sends, through the wireless communication interface, service data to the receiving end device within a predetermined SIFS interval after receiving the CTS frame. Wherein the traffic data also includes a MIC to prevent a probing device from attacking the data.
Optionally, after receiving the service data from the sending end device, the receiving end device performs frame check. When the frame check is successful, the receiving end device sends an Acknowledgement (ACK) message to the sending end device. And then the receiving end equipment authenticates the MIC carried in the service data, and stores the service data if the authentication is successful. If the authentication fails, the traffic data is discarded. Specifically, after receiving the service data, the WiFi module of the receiving end device returns an ACK if the frame check is successful, and then authenticates the service data, and if the authentication is successful, the service data is put into the memory. The service data is further processed by a Central Processing Unit (CPU), otherwise the service data is discarded without being put into a memory.
Where SIFS is an interval time between two adjacent frames defined in the IEEE802.11 standard. When a WiFi device finishes sending a message and waits to receive a response from the opposite end, it needs to make a conversion from sending to receiving, and the received message needs a certain processing time in both the physical layer and the MAC layer, so a certain time interval must be left between two adjacent frames. SIFS has a particularly defined value, e.g. 16 microseconds, but since the message takes some time to propagate over the air, a WiFi device receives a response from the end of the transmission to the other party. The actual time therebetween is not fixed, but must be within a certain range, for example if the standard SIFS is 16 microseconds, the allowable fluctuation range may be 15.1 microseconds to 16.9 microseconds, and we refer to this time range as a frame interval time. After the sending end device finishes sending the sending request message, a clear sending message sent to the sending end device by the receiving end device is received through a wireless communication interface within a preset SIFS, which means that the clear sending message sent by the receiving end device is received after 15.1 microseconds and before 16.9 microseconds after the sending end device finishes sending the sending request message on the assumption that the standard frame interval time is 16 microseconds. After receiving the clear-to-send message, sending data to the receiving end device through the wireless communication interface at a preset SIFS interval, which means that the sending end device sends the data after 15.1 microseconds and before 16.9 microseconds after receiving the clear-to-send message.
The application provides a data transmission method, which comprises the following steps: receiving end equipment receives a P-RTS frame sent by sending end equipment; the P-RTS frame includes: a first MIC; the receiving end equipment judges the validity of the sending end equipment according to the first MIC; and if the receiving end equipment determines that the sending end equipment is legal, sending a CTS frame to the sending end equipment. Therefore, the receiving end equipment is ensured to only send the CTS frame to the legal sending end equipment, and the position privacy of the user holding the receiving end equipment is avoided.
Based on the above embodiment, the receiving end device may further add a Wake Up Receiver (WUR) so that the receiving end device saves more power. The WUR is particularly suitable for the situation that the communication data volume between a sending end device and a receiving end device is very small, and the receiving end device needs to be frequently dormant to save power. And the condition that the sending end equipment needs to be transmitted to the receiving end equipment in time when data is transmitted to the receiving end equipment. If no WUR exists, the receiving end equipment needs to periodically wake up to monitor the broadcast message periodically sent by the sending end equipment in order to timely receive the data sent by the sending end equipment to the receiving end equipment, and judges whether the sending end equipment has the data to send to the receiving end equipment or not according to the indication in the broadcast message, or the sending end equipment and the sending end equipment are appointed to have a short wake-up-sleep period, so that the sending end equipment transmits the data to the receiving end equipment in the latest wake-up period of the receiving end equipment, or the receiving end equipment automatically wakes up to actively inquire whether the data sent to the receiving end equipment exists or not to the. Both of these methods still result in insufficient power savings at the receiving end device. After the receiving end device uses the WUR, the WUR with very low power consumption can work all the time, and the WiFi module in the receiving end device can sleep. When data is transmitted to a receiving end device by a sending end device, a wakeup frame (WUP Packet, WUP) is sent to the WUR of the receiving end device, the WUR of the receiving end device wakes Up a WiFi module after receiving the WUP, and then the sending end device and the receiving end device can complete WiFi communication. Since the principle of the WUR for realizing ultra-low power consumption is that the transmission rate is very low, its circuit is very simple and is not suitable for data communication other than receiving WUP. With the WUR, the sink device can save more power. However, since WUP is transmitted at a low rate, the message is as short as possible, and the WUR id is also short, i.e., the number of bits is small, and is easy to guess. If the detection device monitors the WUR identification of the receiving device, the detection device plays back the WUP, and after the receiving device is awakened by the WUP, the detection device actively sends a message to tell that the detection device wakes up, so that the detection device can determine that the receiving device is nearby. To solve this problem, a data transmission method based on the above-described scenario will be described below.
Fig. 4 is an interaction flowchart of a data transmission method according to another embodiment of the present application. The sending terminal equipment related to the method can be an intelligent terminal such as a mobile phone, a tablet personal computer, an intelligent bracelet and an intelligent watch. Similarly, the sending end device can also be an intelligent terminal such as a mobile phone, a tablet computer, an intelligent bracelet, an intelligent watch and the like. Wherein the receiving end device includes: WUR. As shown in fig. 4, the method includes the steps of:
401. the transmitting end device transmits the WUP to the receiving end device.
The WUP may be sent through a WiFi module of the sending end device, or the sending end device may send the WUP using a special Wake Up Transmitter (WUT), which is not limited in this application. The WUP includes a WUR identifier allocated by the transmitting device to the WUR of the receiving device. In this case, the first variation value described above may be a WUR flag. Of course, the WUR identifier may be notified to the sending end device after the receiving end device determines the WUR identifier itself, and the method for generating the WUR identifier is not limited in the present application. After receiving the WUP, the WUR of the receiving end equipment identifies whether the WUP is to awaken itself according to the WUR identification and other information. If yes, the receiving end equipment powers on the WiFi module of the receiving end equipment, and the receiving end equipment is awakened. The wakeup process of the WiFi module of the receiving end device takes a certain time, for example, may take 5-10 milliseconds. After waking up, the receiving end device does not actively send a message to the sending end device to indicate that the receiving end device wakes up, that is, does not actively send a message, so as to prevent the received wake-up frame from being a message sent by the detection device.
402. And the receiving end equipment receives the P-RST frame sent by the sending end equipment, wherein the P-RST frame carries the first MIC.
403. And the receiving terminal equipment judges the validity of the sending terminal equipment according to the first MIC.
404. And if the receiving end equipment determines that the sending end equipment is legal, sending a CTS frame to the sending end equipment.
Step 402 is similar to step 201, and step 404 is similar to step 203, which are not described herein again. Step 403 may adopt the third alternative of step 202.
That is, the first variation value in the third alternative described above may be a WUR flag. The receiving end equipment determines a second MIC according to the WUR identifier and a field in the P-RTS frame through a session key of the sending end equipment corresponding to the identifier of the sending end equipment; if the first MIC is the same as the second MIC, the receiving end equipment determines that the sending end equipment is legal, otherwise, the receiving end equipment determines that the sending end equipment is illegal.
Optionally, after the sending end device sends the P-RTS, a clear-to-send message sent by the receiving end device to the sending end device is received through the wireless communication interface within a predetermined SIFS, and then service data is sent to the receiving end device through the wireless communication interface within a predetermined SIFS interval after the clear-to-send message is received. Wherein the traffic data also includes a MIC to prevent a probing device from attacking the data. Optionally, after receiving the service data from the sending end device, the receiving end device performs frame check. And after the frame verification is successful, the receiving end equipment sends an ACK message to the sending end equipment. And then the receiving end equipment authenticates the MIC carried in the service data, and stores the data if the authentication is successful. If the authentication fails, the traffic data is discarded. Specifically, after receiving the service data, the WiFi module of the receiving end device returns an ACK if the frame check is successful, then authenticates the service data, if the authentication is successful, the service data is put into the memory and the CPU further processes the service data, otherwise, the service data is not put into the memory, that is, the service data is discarded.
Further, after the transmitting device and the receiving device complete service data transmission, since the WUR identifier is already exposed, in order to prevent the probe device from attacking the wakeup frame, the WUR identifier must be updated, and therefore, the transmitting device and the receiving device need to continue interacting to update the WUR identifier subsequently. Alternatively, the process of updating the WUR identification may be included in the transmission process from the beginning of the P-RTS frame to the end of the last ACK message replied by the receiving device. Wherein the change value of the P-RTS frame can be updated at the same time as the WUR identification is updated.
Specifically, fig. 5 is an interaction flowchart of a data transmission method according to yet another embodiment of the present application. As shown in fig. 5, the method includes the steps of:
501. and the sending end equipment sends a message for updating the WUR identification to the receiving end equipment.
Wherein the message contains a new WUR identification, and a new P-RTS change value. This message needs to be encrypted in order to avoid new WUR identification and new P-RTS change values from being sensed.
502. And the receiving terminal equipment establishes a new mapping relation between the WUR identification and the WUR.
503. The receiving end device sends a message to the sending end device to confirm the reception of the new WUR identifier.
Based on this, the WUR only responds to WUPs containing the new WUR identification. Meanwhile, the receiving end device stores the new P-RTS change value so as to use the change value to authenticate the P-RTS frame message when receiving the P-RTS frame from the sending end device next time.
Optionally, the change value in the P-RTS frame may be the same as the WUR identifier corresponding to the P-RTS frame.
Alternatively, the change value in the P-RTS frame may be determined by both the sending end device and the receiving end device, that is, the sending end device determines a first part of the change value in the P-RTS frame and carries the first part in the message sent in step 401, and the receiving end device determines a second part of the change value in the P-RTS frame and carries the second part in the message sent in step 403.
504. The transmitting end device transmits the WUP to the receiving end device.
The WUP carries a new WUR identification.
505. And the receiving end equipment receives the P-RTS frame sent by the sending end equipment, and the P-RTS frame carries the first MIC.
506. And the receiving terminal equipment judges the validity of the sending terminal equipment according to the first MIC.
507. And if the receiving end equipment determines that the sending end equipment is legal, sending a CTS frame to the sending end equipment.
Steps 505 to 507 and steps 201 to 203 are the same and will not be described herein again.
Optionally, after the sending end device sends the P-RTS, a clear-to-send message sent by the receiving end device to the sending end device is received through the wireless communication interface within a predetermined SIFS, and then service data is sent to the receiving end device through the wireless communication interface within a predetermined SIFS interval after the clear-to-send message is received. Wherein the traffic data also includes a MIC to prevent a probing device from attacking the data. Optionally, after receiving the service data from the sending end device, the receiving end device performs frame check. And after the frame verification is successful, the receiving end equipment sends an ACK message to the sending end equipment. And then the receiving end equipment authenticates the MIC carried in the service data, and stores the data if the authentication is successful. If the authentication fails, the traffic data is discarded. Specifically, after receiving the service data, the WiFi module of the receiving end device returns an ACK if the frame check is successful, then authenticates the service data, if the authentication is successful, the service data is put into the memory and the CPU further processes the service data, otherwise, the service data is not put into the memory, that is, the service data is discarded.
In summary, in the embodiments provided by the present application, the receiving end device only sends a CTS frame to a legitimate sending end device, so as to avoid revealing the location privacy of the user holding the receiving end device. Further, since the first MICs sent by the sending end device to the receiving end device each time are different, the detecting device is more difficult to determine that the user is nearby, and further, the position privacy of the user holding the receiving end device is prevented from being revealed.
The foregoing embodiment describes a data transmission method in this embodiment in detail, and a receiving end device in this embodiment is described in detail below.
Referring to fig. 6, fig. 6 is a diagram illustrating an embodiment of a receiving end device in the present application.
A first receiving unit 601, configured to receive a protected transmission request P-RTS frame sent by a sending end device, where the P-RTS frame includes: a first message integrity code, MIC;
a determining unit 602, configured to determine validity of the sending-end device according to the first MIC;
a first sending unit 603, configured to send a clear to send CTS frame to the sender device when it is determined that the sender device is legal.
Referring to fig. 7, fig. 7 is a diagram illustrating another embodiment of a receiving end device in the present application.
A third receiving unit 701, configured to receive a wakeup frame sent by the sending end device, where the wakeup frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
A second receiving unit 702, configured to receive the first variation value sent by the sending end device;
a first receiving unit 703 is configured to receive a protected transmission request P-RTS frame sent by a sending-end device, where the P-RTS frame includes: a first message integrity code, MIC;
a determining unit 704, configured to determine validity of the sending-end device according to the first MIC;
the determining unit 704 includes:
a first determining subunit 7041, configured to determine whether the P-RTS frame is fresh according to the first change value;
a second determining subunit 7042, configured to determine whether the first MIC is correct;
a first determining subunit 7043, configured to determine that the sending-end device is legal when the P-RTS frame is fresh and the first MIC is correct;
a second determining subunit 7044, configured to determine that the sending-end device is illegal when the P-RTS frame is not fresh and/or the first MIC is incorrect.
The first determining subunit 7041 includes:
an obtaining module 70411, configured to obtain a device identifier of the sending end carried by the P-RTS frame;
a first determining module 70412, configured to determine that the P-RTS frame is fresh when it is determined that the first change value satisfies a preset change rule according to the first change value and a second change value, where the second change value is a change value, recorded by the receiving end device, last sent by the sending end device and corresponding to the sending end device identifier;
a second determining module 70413, configured to determine that the P-RTS frame is not fresh when it is determined that the first change value does not satisfy a preset change rule according to the first change value and the second change value.
The second determining subunit 7042 includes:
a third determining module 70421, configured to determine, by using a session key, a second MIC according to a field in the P-RTS frame, where the session key corresponds to the sender apparatus identifier;
a fourth determining module 70422, configured to determine that the first MIC is correct when the first MIC is the second MIC;
a fifth determining module 70423, configured to determine that the first MIC is incorrect when the first MIC is not the same as the second MIC.
The determining unit 704 may further include:
a third determining subunit 7045, configured to determine, by using a session key, a second MIC according to a field in the P-RTS frame and the first change value, where the session key corresponds to the sending-end device identifier;
a fourth determining subunit 7046, configured to determine that the sending-end device is legitimate when the first MIC is the same as the second MIC;
a fifth determining subunit 7047, configured to determine that the sending-end device is illegal when the first MIC is different from the second MIC.
A first sending unit 705, configured to send a clear to send CTS frame to the sender device when it is determined that the sender device is legal.
Referring to fig. 8, fig. 8 is a diagram illustrating an embodiment of a sending end device in the present application.
A first sending unit 801, configured to send a protected send request P-RTS frame to a receiving end device, where the P-RTS frame includes: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment;
a first receiving unit 802, configured to receive a clear to send CTS frame sent by the receiving end device when the sending end device is legal.
Referring to fig. 9, fig. 9 is another embodiment of a sending end device in the embodiment of the present application.
A third sending unit 901, configured to send a wake-up frame to the receiving end device, where the wake-up frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
A second sending unit 902, configured to send the first change value to the receiving end device, so that the receiving end device determines, according to the first change value and a field in the P-RTS frame, a second MIC to be canceled by using a session key, where the session key corresponds to an identifier of the sending end device.
A first sending unit 903, configured to send a protected send request P-RTS frame to a receiving device, where the P-RTS frame includes: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment;
a first receiving unit 904, configured to receive a clear to send CTS frame sent by the receiving end device when the sending end device is legal.
As shown in fig. 10, an embodiment of the present application provides a receiving end device, which can implement any method embodiment provided by the present application, including any method provided in method claims 1 to 6. Module 1001 is a Central Processing Unit (CPU) of the receiving device, and is configured to obtain the data message received by module 1003 from module 1002 and process the received data message. Module 1002 is a memory for storing data messages received by module 1003. Module 1003 is a WiFi transceiver for receiving messages sent to itself by other devices, such as data messages and P-RTS messages, etc., and sending self-prepared messages such as CTS, ACK messages, etc. The module 1004 is a transceiving antenna, the module 1003 transmits a message to modulate the content of the message to be transmitted into an electrical signal, the electrical signal is transmitted from the module 1004 in an electromagnetic wave form, the module 1003 receives the message, the electromagnetic wave signal is received through the module 1004 and the message transmitted to the module 1005 by other devices is analyzed from the electromagnetic wave signal, and the WUP message is received through the module 1004 by the module 1005. Module 1005 is a wake-up receiver, WUR, that receives WUP messages from other devices to itself via module 1004 and powers up module 1003 when receiving WUP messages to itself, i.e., wake-up module 1003. The processing of data messages by module 1001 is actually the execution of the relevant code implementation. Module 1003 and module 1005 may operate in the same frequency band, and module 1004 includes an antenna. Module 1003 and module 1005 may also operate in different frequency bands, and module 1004 may include multiple antennas suitable for different frequency bands, where the antennas used by module 1003 and module 1005 are different.
As shown in fig. 11, an embodiment of the present application provides a sending end apparatus, which may implement any method embodiment provided by the present application, including any one of the parties provided in method claims 7 to 10. Block 1101 is the Central Processing Unit (CPU) of the sending end device, which is configured to prepare the data message sent through block 1103 and store the data message ready for sending in block 1102. Module 1101 also notifies module 1103 that data is ready after a data message to be sent is ready, so that module 1103 acquires data to be sent from module 1102 and sends the data. Module 1102 is a memory for storing data messages that module 1101 is ready to send via module 1103. Module 1103 is a WiFi transceiver for retrieving from module 1102 a data message that module 1101 is ready to send and a control message, such as a P-RTS message, that module 1103 generates itself and transmits via module 1104. Module 1103 also receives messages such as CTS messages, ACK messages, etc. The module 1104 is a transceiver antenna, the module 1103 sends a message to modulate the content of the message to be sent into an electrical signal, and the electrical signal is transmitted from the module 1104 in an electromagnetic wave form, and the module 1103 receives the message and needs to receive the electromagnetic wave signal through the module 1104 and analyze the message sent by other devices to itself. The module 1101 generates or processes the message is actually executing the relevant code implementation. In some embodiments, the module 1103 is also configured to send a WUP frame. In some embodiments, the sender device further includes a transmitter WUT dedicated to sending WUPs, block 1105. The block 1105 is triggered to transmit WUPs by the block 1103 or the block 1101 when there is data to transmit. The WUP is transmitted by the module 1104. The module 1103 and the module 1105 can operate in the same frequency band, and the module 1104 includes the same antenna. The module 1103 and the module 1105 may also operate in different frequency bands, and then the module 1104 includes multiple antennas suitable for different frequency bands, and the antennas used by the module 1103 and the module 1105 are different.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (20)

1. A method of data transmission, comprising:
receiving end equipment receives a protected sending request P-RTS frame sent by sending end equipment, wherein the P-RTS frame comprises: a first message integrity code, MIC;
the receiving end equipment judges the validity of the sending end equipment according to the first MIC;
and if the receiving end equipment determines that the sending end equipment is legal, sending a Clear To Send (CTS) frame to the sending end equipment.
2. The method of claim 1, wherein the P-RTS frame further comprises: the first change value, the judging, by the receiving end device according to the first MIC, of the validity of the sending end device includes:
the receiving end equipment judges whether the P-RTS frame is fresh or not according to the first change value;
the receiving terminal equipment judges whether the first MIC is correct or not;
if the P-RTS frame is fresh and the first MIC is correct, the receiving end equipment determines that the sending end equipment is legal;
and if the P-RTS frame is not fresh and/or the first MIC is incorrect, the receiving end equipment determines that the sending end equipment is illegal.
3. The method according to claim 2, wherein the receiving-end device determining whether the P-RTS frame is fresh according to the first change value comprises:
the receiving end equipment acquires the sending end equipment identification carried by the P-RTS frame;
if the receiving end device determines that the first change value meets a preset change rule according to the first change value and a second change value, determining that the P-RTS frame is fresh, wherein the second change value is a change value which is recorded by the receiving end device and is sent last time by the sending end device and corresponds to the sending end device identification;
and if the receiving end equipment determines that the first change value does not meet a preset change rule according to the first change value and the second change value, determining that the P-RTS frame is not fresh.
4. The method of claim 3, wherein the determining, by the receiving end device, whether the first MIC is correct comprises:
the receiving end equipment determines a second MIC according to a field in the P-RTS frame through a session key, wherein the session key corresponds to the identification of the sending end equipment;
if the first MIC is the same as the second MIC, the receiving end equipment determines that the first MIC is correct;
and if the first MIC is different from the second MIC, the receiving end equipment determines that the first MIC is incorrect.
5. The method according to any one of claims 1 to 4, wherein before the receiving end device determines the validity of the sending end device according to the first MIC, the method further comprises:
the receiving end equipment receives a first change value sent by the sending end equipment;
the receiving end equipment judges the validity of the sending end equipment according to the first MIC, and the judging comprises the following steps:
the receiving end equipment determines a second MIC according to a field in the P-RTS frame and the first change value through a session key, wherein the session key corresponds to the sending end equipment identifier;
if the first MIC is the same as the second MIC, the receiving end equipment determines that the sending end equipment is legal;
and if the first MIC is different from the second MIC, the receiving end equipment determines that the sending end equipment is illegal.
6. The method according to any one of claims 1 to 4, wherein before the receiving end device receives the P-RTS frame sent by the sending end device, the method further comprises:
the receiving end equipment receives a wake-up frame sent by the sending end equipment, wherein the wake-up frame is used for waking up a wireless communication interface transceiver of the receiving end equipment;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
7. A method of data transmission, comprising:
sending a protected sending request P-RTS frame to a receiving end device by a sending end device, wherein the P-RTS frame comprises: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment;
and if the sending end equipment is legal, the sending end equipment receives a Clear To Send (CTS) frame sent by the receiving end equipment.
8. The method of claim 7, wherein the P-RTS frame further comprises: a first change value, the first change value being used to determine whether the frame is fresh.
9. The method of claim 8, further comprising:
and the sending end equipment sends a first change value to the receiving end equipment so that the receiving end equipment determines a second MIC according to the first change value and a field in the P-RTS frame through a session key, wherein the session key corresponds to the identifier of the sending end equipment.
10. The method according to any one of claims 7 to 9, wherein before the sending end device sends a P-RTS frame to a receiving end device, the method further comprises:
the sending end equipment sends a wake-up frame to the receiving end equipment, and the wake-up frame is used for waking up a wireless communication interface transceiver of the receiving end equipment;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
11. A receiving-end device, comprising:
a first receiving unit, configured to receive a protected transmission request P-RTS frame sent by a sending end device, where the P-RTS frame includes: a first message integrity code, MIC;
the judging unit is used for judging the validity of the sending terminal equipment according to the first MIC;
a first sending unit, configured to send a clear to send CTS frame to the sending-end device when it is determined that the sending-end device is legal.
12. The receiving-end device according to claim 11, wherein the P-RTS frame further includes: a first variation value, the judging unit including:
the first judgment subunit is used for judging whether the P-RTS frame is fresh or not according to the first change value;
the second judgment subunit is used for judging whether the first MIC is correct or not;
a first determining subunit, configured to determine that the sending-end device is legal when the P-RTS frame is fresh and the first MIC is correct;
and the second determining subunit is used for determining that the sending-end equipment is illegal when the P-RTS frame is not fresh and/or the first MIC is incorrect.
13. The receiving end device according to claim 12, wherein the first determining subunit comprises:
an obtaining module, configured to obtain a device identifier at a sending end, where the device identifier is carried by the P-RTS frame;
a first determining module, configured to determine that the P-RTS frame is fresh when it is determined that the first change value satisfies a preset change rule according to the first change value and a second change value, where the second change value is a change value, recorded by the receiving end device, that is sent last time by the sending end device and corresponding to the sending end device identifier;
and the second determining module is used for determining that the P-RTS frame is not fresh when the first change value is determined to not meet a preset change rule according to the first change value and the second change value.
14. The receiving end device of claim 13, wherein the second determining subunit comprises:
a third determining module, configured to determine a second MIC according to a field in the P-RTS frame by using a session key, where the session key corresponds to the sender device identifier;
a fourth determining module to determine that the first MIC is correct when the first MIC is the same as the second MIC;
a fifth determining module to determine that the first MIC is incorrect when the first MIC is not the same as the second MIC.
15. The receiving-end device according to any one of claims 11 to 14, wherein the receiving-end device further includes:
a second receiving unit, configured to receive the first variation value sent by the sending end device;
the judging unit includes:
a third determining subunit, configured to determine, by using a session key, a second MIC according to a field in the P-RTS frame and the first change value, where the session key corresponds to the sending-end device identifier;
a fourth determining subunit, configured to determine that the sending-end device is legal when the first MIC is the same as the second MIC;
and a fifth determining subunit, configured to determine that the sending-end device is illegal when the first MIC is different from the second MIC.
16. The receiving-end device according to any one of claims 11 to 14, wherein the receiving-end device further includes:
a third receiving unit, configured to receive a wake-up frame sent by the sending end device, where the wake-up frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
17. A transmitting-end device, comprising:
a first sending unit, configured to send a protected send request P-RTS frame to a receiving device, where the P-RTS frame includes: a first message integrity code MIC, wherein the first MIC is used for judging the validity of the sending terminal equipment;
a first receiving unit, configured to receive a clear to send CTS frame sent by the receiving end device when the sending end device is legal.
18. The transmitting-end device of claim 17, wherein the P-RTS frame further comprises: a first change value, the first change value being used to determine whether the frame is fresh.
19. The sender device of claim 18, wherein the sender device further comprises:
a second sending unit, configured to send the first change value to the receiving end device, so that the receiving end device determines a second MIC according to the first change value and a field in the P-RTS frame by using a session key, where the session key corresponds to an identifier of the sending end device.
20. The sender device according to any one of claims 17 to 19, wherein the sender device further comprises:
a third sending unit, configured to send a wakeup frame to the receiving end device, where the wakeup frame is used to wake up a wireless communication interface transceiver of the receiving end device;
the wake-up frame comprises an identifier of a wireless wake-up receiver of the receiving end, and the first change value is the identifier of the wireless wake-up receiver.
CN201710684806.0A 2016-10-11 2017-08-10 Data transmission method and related equipment thereof Active CN107920054B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2016108909613 2016-10-11
CN201610890961 2016-10-11
CN201710218342 2017-04-05
CN2017102183424 2017-04-05

Publications (2)

Publication Number Publication Date
CN107920054A CN107920054A (en) 2018-04-17
CN107920054B true CN107920054B (en) 2020-11-17

Family

ID=61898599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710684806.0A Active CN107920054B (en) 2016-10-11 2017-08-10 Data transmission method and related equipment thereof

Country Status (1)

Country Link
CN (1) CN107920054B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060140147A1 (en) * 2004-12-23 2006-06-29 Van Bemmel Jeroen Bandwidth allocation protocol for shared wireless networks
CN101431510B (en) * 2007-11-09 2013-02-27 株式会社Ntt都科摩 Multicast method in wireless local area network
JP2010263488A (en) * 2009-05-08 2010-11-18 Sony Corp Communications apparatus and method, computer program, and communication system
CN101742501B (en) * 2010-01-15 2012-06-20 南京邮电大学 Safe multi-channel media access control method of wireless self-organizing network
US10178582B2 (en) * 2012-08-06 2019-01-08 Qualcomm Incorporated Apparatus and methods for frame control design

Also Published As

Publication number Publication date
CN107920054A (en) 2018-04-17

Similar Documents

Publication Publication Date Title
KR102166619B1 (en) Systems and methods for safe and fast wake-up of stations
EP3547759B1 (en) Method, access point and wireless local area network system for establishing a wireless local area network connection between an access point and a station
JP2023517107A (en) Wireless intrusion prevention system, wireless network system including same, and method of operating wireless network system
JP2019036971A (en) Systems and methods for effective access point discovery
KR20140035600A (en) Dongle apparatus for preventing wireless intrusion
JP6651613B2 (en) Wireless communication
US11019037B2 (en) Security improvements in a wireless data exchange protocol
US20150172918A1 (en) Method for transmitting data, access point and station
CN109314925B (en) Channel switching method and device
US20200015164A1 (en) Key and packet number management for wakeup radio frames
CN107920054B (en) Data transmission method and related equipment thereof
CN110830421B (en) Data transmission method and device
CN113038464B (en) Information transmission method and equipment
US20200120493A1 (en) Apparatus and method for communications
JP2024502087A (en) Hardening mechanism to detect fake base station attacks
JP2008048212A (en) Radio communication system, radio base station device, radio terminal device, radio communication method, and program
CN111182548B (en) Pseudo network equipment identification method and communication device
WO2017095303A1 (en) Provisioning node, communication node and methods therein for handling key identifiers in wireless communication
CN111683368A (en) Pairing method using SSID, audio and video data transmission system and equipment
CN111788809A (en) Message receiving and sending method and device
EP4024933A1 (en) Enhanced mechanism for detecting fake base station attacks
CN111246412B (en) Method and device for sending positioning information and method and device for verifying sender of positioning information
US20220086644A1 (en) Methods, network node and wireless device for verification of broadcast messages
EP4245022A1 (en) Obscured device identity in wireless transmissions
CN115515140A (en) Method, device, equipment and storage medium for preventing wireless network attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant