Implementation of an intrusion detection system based on wireless positioning

WLAN networks are widely deployed and can be used for testbed and application developments in academic environments. This paper presents wireless positioning testbed and a related application implementation methodology as a case study. Nowadays state-of-the-art WLAN positioning systems achieve high location estimation accuracy. In designated areas the signal profile map can be designed and used for such a positioning. Coverage of WLAN networks is typically wider than the authorized areas and there might be network intrusion attempts from the vicinity areas such as parking lots, cafeterias, etc. In addition to conventional verification and authorization methods, the network can locate the user, verify if his location is in the authorized area and apply additional checks to find the violators.

[1]  V. Padmanabhan,et al.  Enhancements to the RADAR User Location and Tracking System , 2000 .

[2]  Glen Zorn,et al.  Protected EAP Protocol (PEAP) Version 2 , 2004 .

[3]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[4]  David Garlan,et al.  Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..

[5]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[6]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[7]  Simon Blake-Wilson,et al.  EAP Tunneled TLS Authentication Protocol Version 1 (EAP-TTLSv1) , 2006 .

[8]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .