Title :
Intruder Location Tracking
Author :
Zeidanloo, H.R. ; Ngadi, M.A.
Author_Institution :
Fac. of Comput. Sci. & Inf. Syst., UTM, Kuala Lumpur, Malaysia
Abstract :
Since wireless networks provide flexibility, mobility and convenience in setup, they became more widespread today. However, due to the nature of wireless networks that use shared medium for communications it needs more security features as its wired counterpart. Attackers can use proper devices and techniques to pull signals from the air and gain access to the unprotected wireless networks from anywhere in range of wireless network which receive wireless signals. Therefore, it is very difficult to trace back to the attacker. The three current location tracking solution: closest access point, triangulation and radio frequency fingerprinting have their own limitations in tracing wireless intruders. In this paper, in the beginning we consider discovering wireless networks techniques and then overview the three current solutions for location tracking and also propose an amendment for triangulation method that aims to overcome the limitations of this method.
Keywords :
radio tracking; telecommunication security; closest access point; intruder location tracking; radio frequency fingerprinting; security features; triangulation method; unprotected wireless networks; Communication system security; Computer hacking; Computer networks; Computer science; Fingerprint recognition; Information systems; Monitoring; Radio frequency; Turing machines; Wireless networks; RF; intruder; triangulation method; wireless;
Conference_Titel :
Computer and Electrical Engineering, 2009. ICCEE '09. Second International Conference on
Conference_Location :
Dubai
Print_ISBN :
978-1-4244-5365-8
Electronic_ISBN :
978-0-7695-3925-6
DOI :
10.1109/ICCEE.2009.53