{"title":"Intruder Location Tracking","authors":"Hossein Rouhani Zeidanloo, M. A. Ngadi","doi":"10.1109/ICCEE.2009.53","DOIUrl":null,"url":null,"abstract":"Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"56 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2009.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: Closest Access Point, Triangulation and Radio Frequency Fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for Triangulation method that aims to overcome the limitations of this method.