Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment
Iyad Aldasouqi, Walid Salameh
Pages - 85 - 99 | Revised - 30-11-2010 | Published - 20-12-2010
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Security, wireless, Authentication, Access points, Sensors
ABSTRACT
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques.
Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications.
This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
1 | Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104. |
Advancing Wireless Link Signatures for Location Distinction, by J.Z. Mohammad H. Firoozz Neal Patwariz Sneha K. Kasera | |
D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using singalprints”. In Proceedings of WiSe’06: ACM Workshop on Wireless Security, 2006 | |
E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study”. In Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), 2004 | |
G. M. Djuknic and R. E. Richton, \Geolocation and assisted GPS," IEEE Computer, 34(2): 123-125, 2001 | |
Hazas, M., Scott, J., Krumm, J. (2004) Location-Aware Computing Comes of Age. Computer, 37 (2004) 95-97 | |
http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm | |
Iyad Aldasouqi, Walid Salameh, Detecting and Localizing Wireless Network Attacks Techniques, CSC, 2010 | |
J. Hightower, G. Boriello, and R. Want. “SpotON: An indoor 3D location sensing technology based on RF signal strength”. Technical Report 2000-02-02, University of Washington, 2000 | |
J. Small, A. Smailagic, and D. P. Siewiorek, “Determining user location for context aware computing through the use of a wireless lan infrastructure," Online, Dec. 2000. [Online]. Available At: http://www.2.cs.cmu.edu/»aura/docdir/small00.pdf | |
Joshua Wright, Detecting Wireless LAN MAC Address Spoofing, 2003 | |
Küpper, A. (2005) Location-based services. John Wiley & Sons, Chichester | |
Krzysztof, K., Hjelm, J. (2006) LBS Applications and Services, CRC Press, ISBN: 0849333490. | |
M. Ladd, K. E. Bekris, A. Rudys, L. E. Kavraki, D. S. Wallach, and G. Marceau, “Roboticsbased location sensing using wireless ethernet”. In MobiCom ’02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, Sept. 2002, pp. 227– 238 | |
Neal Patwari and Sneha Kasera, Robust Location Distinction Using Temporal Link Signatures | |
P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system". In Proc. IEEE Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'00), Tel Aviv, Israel, Mar. 2000, | |
P. Bahl and V. N. Padmanabhan, “Radar: An in-building rf based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 200 | |
P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system," in Proc. IEEE Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'00), Tel Aviv, Israel, Mar. 200 | |
P. Bahl and V. N. Padmanabhan. “RADAR: An In-Building RF-Based User Location and Tracking System”. In Proceedings of the IEEE Conference on Computer Communications (InfoCom), volume 2, 2000 | |
P. Bahl and V. Padmanabhan.” RADAR: An in-building RF based user location and tracking system”. In Proceedings of the Conference on Computer Communications, volume 2, pages 775–784, Tel Aviv, Israel, March 2000. | |
P. Castro, P. Chiu, T. Kremenek, and R. Muntz. “A Probabilistic Room Location Service for Wireless Networked Environments.” In Proceedings of the International Conference on Ubiquitous Computing (Ubicomp), volume 2201, 2001. | |
P. Tao, A. Rudys, A. M. Ladd, and D. S. Wallach. “Wireless LAN location-sensing for security applications.’ In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003. | |
PARADIS: Physical 802.11 Device Identification with Radiometric Signatures by Vladimir Brik, Suman Banerjee, Marco Gruteser, Sangho Oh | |
R. A. Redner and H. F. Walker, “Mixture densities, maximum likelihood and the EM algorithm”. SIAM Review, 26(2):195–239, 198 | |
R. Want, A. Hopper, V. Falcao, and J. Gibbons. “The Active Badge Location system.” ACM Transactions on Information Systems, 10(1), 1992 | |
S. Pandey, B. Kim, F. Anjum, and P. Agrawal. “Client assisted location data acquisition scheme for secure enterprise wireless networks”. IEEE Wireless Communications and Networking Conference (WCNC), 2, March 2005 | |
S. Pandey, F. Anjum, and P. Agrawal. “TRaVarSeL–Transmission Range Variation based Secure Localization”, pages 215–236. 2007 | |
S. Pandey, F. Anjum, B. Kim, and P. Agrawal. “A low-cost robust localization scheme for WLAN”. In Proceedings of the International Workshop on Wireless Internet, New York, NY, USA, 2006. ACM. | |
S. Saha, K. Chaudhuri, D. Sanghi, and P. Bhagwat, “Location determination of a mobile device using ieee 802.11b access point signals," in Proc. IEEE Wireless Communications and Networking Conference (WCNC'03), New Orleans, LA, Mar. 2003 | |
Swisscom.com. “Swisscom Mobile to launch Public Wireless LAN on 2 December 2002”. 2 Jan. 2003. Available at: http://www.swisscom.com/mr/content/media/20020924_EN.html (Accessed 9 Dec. 2002) | |
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless, Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and Jens B. Schmit | |
Yingying Chen, Wade Trappe, Richard P. Martin, Detecting and Localizing Wireless Spoofing Attacks | |
. Aaron E. Earle, Wireless Security Handbook | |
Wireless Intrusion Detection Systems, SANS, Ken Hutchison, 2004 | |
Mr. Iyad Aldasouqi
Royal Scientific Society - Jordan
iyad@rss.gov.jo
Mr. Walid Salameh
- Jordan
|
|
|
|
View all special issues >> | |
|
|