EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Personal locator services emerge
IEEE Spectrum
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
WLAN Location Determination via Clustering and Probability Distributions
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Experimenting an Indoor Bluetooth-Based Positioning Service
ICDCSW '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Wireless LAN location-sensing for security applications
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
IEEE Transactions on Mobile Computing
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
VOR base stations for indoor 802.11 positioning
Proceedings of the 10th annual international conference on Mobile computing and networking
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
Secure location verification using radio broadcast
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Relative location estimation in wireless sensor networks
IEEE Transactions on Signal Processing
Nuisance Parameters and Location Accuracy in Log-Normal Fading Models
IEEE Transactions on Wireless Communications
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
WLAN location determination without active client collaboration
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
IEEE Transactions on Wireless Communications
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Hi-index | 0.00 |
In this paper we investigate position-based enhancements to Wi-Fi network security. Specifically, we investigate whether Received Signal Strength (RSS) measurements can identify attempts at network access by malicious nodes exterior to an authorised network perimeter. We assume the malicious nodes will spoof their received or transmitted power-levels in attempts to circumvent standard position-based security techniques. We outline why residual analysis of the RSS measurements cannot robustly identify illegal network access requests. However, we show that by referring the residual RSS analysis to a 'claimed position', interior to the authorised perimeter, a robust position-based verification system for secure network access can be developed. Indoor systems based on RSS fingerprints and differential RSS fingerprints are studied. Outdoor systems under the assumption of log-normal shadowing are also investigated.