The active badge location system
ACM Transactions on Information Systems (TOIS)
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Understanding and Using Context
Personal and Ubiquitous Computing
Wireless Networks
Error characteristics and calibration-free techniques for wireless LAN-based location estimation
Proceedings of the second international workshop on Mobility management & wireless access protocols
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Two methods of authenticated positioning
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
A low-cost robust localization scheme for WLAN
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Secure Location Verification with Hidden and Mobile Base Stations
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is an essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communication parties. Authorization of users is also a very important aspect of network integrity. There exist mechanisms defined by the Wi-Fi Protected Access (WPA) protocol that enable such functionality; however, recent attacks on such systems showed that these mechanisms can be defined. In this paper, we propose a new scheme to authenticate and authorize 802.11 wireless nodes within a network. This new layer of security relies on a neural network decision engine that restricts network access to mobile nodes whose physical location is within a threshold distance from the wireless access point or the controller of the network. This method gives an extra layer of security and allows policies to be enforced which only allow network access from a certain section of the network. We give a detailed description of the work done as well as a performance simulation analysis of this scheme.