Results 1 to 5 of 5
  1. #1
    Senior Member
    Join Date
    Jun 2002

    802.11 Positioning System = Security

    WiFi software tracks you down

    Positioning technology company Ekahau has released an updated version of its software, which allows devices to be physically tracked when they are connected to an 802.11 WLAN network.

    Interesting stuff, but the most intriguing aspect about this is the possible enhancements to the security of 802.11 that this could introduce (courtesy of Slashdot). If you could predefine an area for allowed connections to the network, this could prevent malicious users from accessing your network from an outside point. If you set the 'trusted' area as your workplace, then people would not be able to access your network through wardriving or similar activities.

    I am not sure if the currently insecure nature of wireless networking is because of the poor skills of the administrators who run these networks, or the inherently insecure nature of 802.11 itself. Judging from the other threads on this issue (specifically this one) it is a combination of both. Regardless, this positioning system may be able to provide added security to 802.11 networks.


  2. #2
    Senior Member
    Join Date
    Nov 2001
    some interesting as well as some nauseating uses projected for Wi-Fi but using triangulation as part of the authentication process sure wouldn't hurt any
    Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”

  3. #3
    Senior Member
    Join Date
    Aug 2002
    That's pretty cool. The implications are endless. As far as WiFi goes, couldn't there be some sort of "terminators" placed at the edge of the desired operating area to prevent the signal from leaking out into the perimeter where any number of "war drivers" could piggyback? I am just wondering since this has become such an issue. Maybe it's out already. This is indeed an interesting article. Thanks for the post.
    Opinions are like holes - everybody\'s got\'em.


  4. #4
    Old-Fogey:Addicts founder Terr's Avatar
    Join Date
    Aug 2001
    Seattle, WA
    T2k2, the 'terminators' would probably involve excessively expensive new paneling and stuff like that. They might as well lay good old Cat5 then.

    Now, I can imagine intruders using dual directional-antenna systems to send signals in such a way that the triangulation result is wrong, or using a very narrow beam to try to avoid giving the security system multiple recieving sources with which to triangulate.
    [HvC]Terr: L33T Technical Proficiency

  5. #5
    Senior Member
    Join Date
    Jun 2002
    Originally posted here by Terr
    or using a very narrow beam to try to avoid giving the security system multiple recieving sources with which to triangulate
    What if the system refused to accept a remote connection if it could not verify your actual position? Not totally sure, but I think it would overcome problems such as this one.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.