• Jun 20, 2019 News! IJFCC Vol. 6, No. 4-Vol. 7, No. 2 has been indexed by EI (Inspec).   [Click]
  • Jun 26, 2019 News!Vol.8, No.2 has been published with online version.   [Click]
  • Apr 02, 2019 News!The papers published in Vol.7, No.3-No.4 have all received dois from Crossref.
General Information
    • ISSN: 2010-3751 (Print)
    • Frequency: Quarterly
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Crossref, Electronic Journals LibraryEI (INSPEC, IET), EBSCO, etc.
    • E-mail:  ijfcc@ejournal.net 
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2014Vol.3(6): 372-376 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2014.V3.330

Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization

Asish Kumar Dalai and Sanjay Kumar Jena
Abstract—The method of obtaining the physical co-ordinates of a device is known as localization. Location information of the wireless devices in a network has many applications. Generally we use GPS (Global Positioning System) to get the location but it fails to provide the service in an indoor environment. Therefore we need a local positioning system, which can provide the relative location information in a network. Many approaches has been made for wireless localization using the distance obtained through Time of Arrival (ToA), Time Difference of Arrival (TDoA), Received Signal Strength (RSS) etc.. The proposed m e t h o d uses RSS with minimum overhead compared to conventional multiliteration techniques. Due to the growing importance of security in Wi-Fi, the location information has been used for intrusion detection. The proposed model compares the intruder information with preset profile of genuine devices for full proof detection of the intrusion. It has been observed that the model outperforms its counterparts.

Index Terms—Intrusion detection, wireless security, localization.

The authors are with the Department of Computer Science and Engineering, National Institute of Technology Rourkela, India (e-mail: dalai.asish@gmail.com, skjena@nitrkl.ac.in).


Cite: Asish Kumar Dalai and Sanjay Kumar Jena, "Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization," International Journal of Future Computer and Communication vol. 3, no. 6, pp. 372-376, 2014.

Copyright © 2008-2019. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net