Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(556.31KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment
Iyad Aldasouqi, Walid Salameh
Pages - 85 - 99     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4   Issue - 5    |    Publication Date - December 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Security, wireless, Authentication, Access points, Sensors
ABSTRACT
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
CITED BY (1)  
1 Staniec, K., & Kowal, M. (2013). A simple method for determining an optimal number of access points in distributed WLAN networks. Elektronika ir Elektrotechnika, 19(9), 101-104.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 CiteSeerX
4 refSeek
5 iSEEK
6 Socol@r
7 Scribd
8 slideshare
9 PDFCAST
10 PdfSR
1 Wireless Intrusion Detection Systems, SANS, Ken Hutchison, 2004
2 http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm
3 Swisscom.com. “Swisscom Mobile to launch Public Wireless LAN on 2 December 2002”. 2 Jan. 2003. Available at: http://www.swisscom.com/mr/content/media/20020924_EN.html (Accessed 9 Dec. 2002)
4 Joshua Wright, Detecting Wireless LAN MAC Address Spoofing, 2003
5 Yingying Chen, Wade Trappe, Richard P. Martin, Detecting and Localizing Wireless Spoofing Attacks
6 R. A. Redner and H. F. Walker, “Mixture densities, maximum likelihood and the EM algorithm”. SIAM Review, 26(2):195–239, 198
7 Iyad Aldasouqi, Walid Salameh, Detecting and Localizing Wireless Network Attacks Techniques, CSC, 2010
8 M. Ladd, K. E. Bekris, A. Rudys, L. E. Kavraki, D. S. Wallach, and G. Marceau, “Roboticsbased location sensing using wireless ethernet”. In MobiCom ’02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, Sept. 2002, pp. 227– 238
9 D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using singalprints”. In Proceedings of WiSe’06: ACM Workshop on Wireless Security, 2006
10 Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless, Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, and Jens B. Schmit
11 Advancing Wireless Link Signatures for Location Distinction, by J.Z. Mohammad H. Firoozz Neal Patwariz Sneha K. Kasera
12 PARADIS: Physical 802.11 Device Identification with Radiometric Signatures by Vladimir Brik, Suman Banerjee, Marco Gruteser, Sangho Oh
13 P. Bahl and V. N. Padmanabhan, “Radar: An in-building rf based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 200
14 E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study”. In Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), 2004
15 Neal Patwari and Sneha Kasera, Robust Location Distinction Using Temporal Link Signatures
16 . Aaron E. Earle, Wireless Security Handbook
17 P. Bahl and V. Padmanabhan.” RADAR: An in-building RF based user location and tracking system”. In Proceedings of the Conference on Computer Communications, volume 2, pages 775–784, Tel Aviv, Israel, March 2000.
18 G. M. Djuknic and R. E. Richton, \Geolocation and assisted GPS," IEEE Computer, 34(2): 123-125, 2001
19 P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system". In Proc. IEEE Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'00), Tel Aviv, Israel, Mar. 2000,
20 P. Bahl and V. N. Padmanabhan, “RADAR: an in-building RF-based user location and tracking system," in Proc. IEEE Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'00), Tel Aviv, Israel, Mar. 200
21 S. Saha, K. Chaudhuri, D. Sanghi, and P. Bhagwat, “Location determination of a mobile device using ieee 802.11b access point signals," in Proc. IEEE Wireless Communications and Networking Conference (WCNC'03), New Orleans, LA, Mar. 2003
22 J. Small, A. Smailagic, and D. P. Siewiorek, “Determining user location for context aware computing through the use of a wireless lan infrastructure," Online, Dec. 2000. [Online]. Available At: http://www.2.cs.cmu.edu/»aura/docdir/small00.pdf
23 Krzysztof, K., Hjelm, J. (2006) LBS Applications and Services, CRC Press, ISBN: 0849333490.
24 Hazas, M., Scott, J., Krumm, J. (2004) Location-Aware Computing Comes of Age. Computer, 37 (2004) 95-97
25 Küpper, A. (2005) Location-based services. John Wiley & Sons, Chichester
26 P. Bahl and V. N. Padmanabhan. “RADAR: An In-Building RF-Based User Location and Tracking System”. In Proceedings of the IEEE Conference on Computer Communications (InfoCom), volume 2, 2000
27 P. Castro, P. Chiu, T. Kremenek, and R. Muntz. “A Probabilistic Room Location Service for Wireless Networked Environments.” In Proceedings of the International Conference on Ubiquitous Computing (Ubicomp), volume 2201, 2001.
28 J. Hightower, G. Boriello, and R. Want. “SpotON: An indoor 3D location sensing technology based on RF signal strength”. Technical Report 2000-02-02, University of Washington, 2000
29 R. Want, A. Hopper, V. Falcao, and J. Gibbons. “The Active Badge Location system.” ACM Transactions on Information Systems, 10(1), 1992
30 S. Pandey, F. Anjum, and P. Agrawal. “TRaVarSeL–Transmission Range Variation based Secure Localization”, pages 215–236. 2007
31 S. Pandey, F. Anjum, B. Kim, and P. Agrawal. “A low-cost robust localization scheme for WLAN”. In Proceedings of the International Workshop on Wireless Internet, New York, NY, USA, 2006. ACM.
32 S. Pandey, B. Kim, F. Anjum, and P. Agrawal. “Client assisted location data acquisition scheme for secure enterprise wireless networks”. IEEE Wireless Communications and Networking Conference (WCNC), 2, March 2005
33 P. Tao, A. Rudys, A. M. Ladd, and D. S. Wallach. “Wireless LAN location-sensing for security applications.’ In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003.
Mr. Iyad Aldasouqi
Royal Scientific Society - Jordan
iyad@rss.gov.jo
Mr. Walid Salameh
- Jordan