Font Size: a A A

Design And Implementation Of Surveillance And Shielding Wi-Fi Wireless System

Posted on:2016-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2416330590968413Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of 4G network and intelligent terminal equipment,the Internet operators vigorously promote the size of the Wi-Fi network deployment.Wi-Fi wireless as "the fifth categories of public facilities" has offered netizens to use.Compared with the wired network,Wi-Fi has many advantages,such as set up convenient,flexible and economical,easy to expansion,low cost and so on.It has promoted the past use of cable to connect the computer into the wireless networking.When mobile terminals develop quickly,Wi-Fi has a wide range of popularization and application.However,at the same time,the difficulty of network supervision has gradually increased.Many criminals use the wireless network to spread rumors,publish illegal speech,do some criminal acts,and bring much negative impact to the stability of the country and social.So how to surveillance and control the Wi-Fi wireless network,has become the problem to be solved urgent of police organs,and has great realistic significance for maintaining social security and catching cybercriminals.In this context,aiming at compensate for the blind area of investigation,through survey and research,a surveillance and shielding Wi-Fi wireless system is developed.The system realizes data investigation,wireless location,network shielding and Trojan attacking to the target terminal in Wi-Fi wireless network environment.The main work of this paper includes the following aspects:1.System requirement analysis.According to the police needs to carry out survey evidence,arresting,serious emergencies treatment and long-term investigation,this paper analyzes the system requirements.The functional requirements,performance requirements and usability requirements are defined,and the system processes are modelled.2.System architecture design and key technology research.The system is composed of the host interface interaction subsystem,the security control unit subsystem,the Wi-Fi unit subsystem and antennas.The security control unit subsystem is responsible for the implementation of network scanning,wireless password cracking,network data analysis and Trojan attacking.The Wi-Fi unit subsystem is responsible for the implementation of the network hijacking,Wi-Fi location and network shielding.Then,the key technologies,including wireless password cracking,Trojan attacking and target terminal location,are researched in detail.3.System detailed design and implementation.Using object-oriented method,every subsystem of the surveillance and shielding Wi-Fi wireless system is designed and implemented in detail,through activity diagram,VOPC class diagram and sequence diagram.4.System testing.Under seven test scenes,including coffee shop,airport terminal,residential building,square and so on,the system functional testing and performance testing are performed.The test results show that system functions are realized correctly,and accuracy and performance of the system achieve the expected goal.And thus the system has high availability and application value.
Keywords/Search Tags:Wi-Fi, password cracking, data investigation, wireless location, network shielding
PDF Full Text Request
Related items