skip to main content
10.1145/1815396.1815668acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

WLAN location determination without active client collaboration

Published:28 June 2010Publication History

ABSTRACT

Location determination of devices in wireless networks has been around for some time. Due to the fact that most approaches are based on client collaboration, they are not suitable for being integrated in security related components as intrusion detection or access control systems. In this paper we propose an approach that works without any client collaboration and even awareness by the client. Further on, our architecture is intended to be deployed on standard state-of-the-art IEEE 802.11g access points which operate using open source firmware as OpenWRT. We use these modified access points to collect, process and relay received signal strength (RSS) values of all communicating clients. These values are then used for trilateration using a location determination algorithm on a centralized server. We also present a working prototype, its promising results and possible further enhancements of our approach.

References

  1. L. F. M. de Moraes and B. A. A. Nunes, "Calibration-free wlan location system based on dynamic mapping of signal strength," New York, NY, USA, pp. 92--99, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Smailagic and D. Kogan, "Location sensing and privacy in a context-aware computing environment," Wireless Communications, IEEE, vol. 9, no. 5, pp. 10--17, Oct. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Bahl and V. N. Padmanabhan, "Radar: An in-building rf-based user location and tracking system," in IEEE INFOCOM, Mar 2000, pp. 2:775--784.Google ScholarGoogle Scholar
  4. A. Taheri, A. Singh, and E. Agu, "Location fingerprinting on infrastructure 802.11 wireless local area networks location fingerprinting on infrastructure 802.11 wireless local area networks," in LCN '04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks. Washington, DC, USA: IEEE Computer Society, 2004, pp. 676--683. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Castro, P. Chiu, T. Kremenek, and R. R. Muntz, "A probabilistic room location service for wireless networked environments," in UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing. London, UK: Springer-Verlag, 2001, pp. 18--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Youssef and A. Agrawala, "Small-scale compensation for wlan location determination systems," in Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE, vol. 3, March 2003, pp. 1974--1978 vol. 3.Google ScholarGoogle Scholar
  7. R. A. Malaney, "Securing wi-fi networks with position verification: extended version," Int. J. Secur. Netw., vol. 2, no. 1/2, pp. 27--36, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. H. Lim, L.-C. Kung, J. C. Hou, and H. Luo, "Zero-configuration, robust indoor localization: Theory and experimentation," in INFOCOM. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  9. A. Peres, R. F. Weber, P. A. R. Torres, and R. D. Vecchia, "Ieee 802.11 wireless location and network security mechanism through fingerprint, triangulation and dynamic obstacle identification," in IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing. New York, NY, USA: ACM, 2009, pp. 1459--1463. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Appel and P. Ebinger, "Entfernungsschätzungen basierend auf funksignalstärkemessungen für die angriffserkennung in manets," in D-A-CH Security 2008. Proceedings: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, 2008, pp. 249--261.Google ScholarGoogle Scholar

Index Terms

  1. WLAN location determination without active client collaboration

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            IWCMC '10: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
            June 2010
            1371 pages
            ISBN:9781450300629
            DOI:10.1145/1815396

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 June 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader