• Jan 05, 2017 News![CFP] 2017 the annual meeting of IJFCC Editorial Board, ICCTD 2017, will be held in Paris, France during March 20-22, 2017.   [Click]
  • Mar 24, 2016 News! IJFCC Vol. 4, No. 4 has been indexed by EI (Inspec).   [Click]
  • Mar 24, 2017 News!Vol.6, No.1 has been published with online version.   [Click]
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: Google Scholar, Engineering & Technology Digital Library, and Crossref, DOAJ, Electronic Journals LibraryEI (INSPEC, IET).
    • E-mail:  ijfcc@ejournal.net 
Editor-in-chief
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2014Vol.3(6): 372-376 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2014.V3.330

Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization

Asish Kumar Dalai and Sanjay Kumar Jena
Abstract—The method of obtaining the physical co-ordinates of a device is known as localization. Location information of the wireless devices in a network has many applications. Generally we use GPS (Global Positioning System) to get the location but it fails to provide the service in an indoor environment. Therefore we need a local positioning system, which can provide the relative location information in a network. Many approaches has been made for wireless localization using the distance obtained through Time of Arrival (ToA), Time Difference of Arrival (TDoA), Received Signal Strength (RSS) etc.. The proposed m e t h o d uses RSS with minimum overhead compared to conventional multiliteration techniques. Due to the growing importance of security in Wi-Fi, the location information has been used for intrusion detection. The proposed model compares the intruder information with preset profile of genuine devices for full proof detection of the intrusion. It has been observed that the model outperforms its counterparts.

Index Terms—Intrusion detection, wireless security, localization.

The authors are with the Department of Computer Science and Engineering, National Institute of Technology Rourkela, India (e-mail: dalai.asish@gmail.com, skjena@nitrkl.ac.in).

[PDF]

Cite: Asish Kumar Dalai and Sanjay Kumar Jena, "Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization," International Journal of Future Computer and Communication vol. 3, no. 6, pp. 372-376, 2014.

Copyright © 2008-2016. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net