Finding the trajectory path of a wireless device in WLAN
Controlling unauthorized access and finding the location of a device in wireless local area networks is necessary nowadays. Sniffing tools and regular inspections around the network might be helpful to control the unauthorized access but they are not the complete solution. Navigation techniques like GPS and Loran are complex and expensive and they need extra infrastructure to use in networks. Tracking the location of a wireless device in a wireless network is useful not only to avoid unauthorized access but also to inform the upcoming new access point (AP) before the device enters into its coverage area. A special purpose message exchange protocol (between the access points and the wireless device) was designed to be used in conjunction with some mathematical equations to track the device in wireless networks which would provide a method to control unauthorized access complementing 802.1X authentication protocol. Network model represents AP's locations, coverage areas, and signal levels based on distances. Device model deals with signal strengths, selection of APs, device physical location, and authentication. The simulation utilizes the network and device models to exchange messages between APs and devices and to study the best ways to detect unauthorized access and find policies to control APs based on device locations. This analysis provides a smooth transition between APs, a three point and two point techniques to estimate the current location and trajectory of the device.
Korada, Ramana Murty, "Finding the trajectory path of a wireless device in WLAN" (2003). ETD Collection for University of Texas, El Paso. AAIEP10573.