The active badge location system
ACM Transactions on Information Systems (TOIS)
A Statistical Modeling Approach to Location Estimation
IEEE Transactions on Mobile Computing
A Probabilistic Room Location Service for Wireless Networked Environments
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Physically Locating Wireless Intruders
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Hi-index | 0.00 |
Unauthorized access points on a wireless network, known as rogue access points, represent significant security vulnerabilities. Commercial and open source tools are available to detect and locate such devices. As part of a class project, students in our Computer Security course assisted in the development of a software tool, called WiVis, that uses interactive visualization to locate rogue access points. Distributed sensors are "profile mapped" to determine how they receive wireless signals from the environment around them. Visual displays of the maps as contour lines are overlaid onto a schematic of the office or lab space. When sensors detect an access point, contour line intersection visually show the predicted location of the device. The tool runs on standard platforms and requires no special hardware.