The design of a localization and tracking system for an identified client process in a given internal wireless network

Didar S Sohi, Tennessee State University


Communications have taken the form of radio waves which in the case of Wireless Fidelity (Wi-Fi) networks suffer from the same security flaws as wired networks, but also introduce additional issues. Weak security and equipment configurations perpetuate increasing attacks from malicious individuals. Even with advances in technology, it is still not possible to localize and track a computer in an indoor environment. Satellites can be used to track a computer as long as line of sight exists, but once indoors this is no longer an option. This research developed a security mechanism for the localization and tracking of an identified process on an internal IEEE 802.11g wireless network. An identified process includes any IEEE 802.11g wireless device such as a laptop, pocket PC, PDA, or Smartphone, which has been detected as an intruder on the wireless network. The concept for this research is based on the deployment of an array of directional antennae along the perimeter of a given wireless network. The antennae examined the data across the network and then localized the target traffic using triangulation based on Received Signal Strength Intensity (RSSI). With all antennae focusing their sights on the target, it becomes possible to create a 'hot zone,' where all of the antenna beams intersect. When the 'hot zone' became mobile, the antennae were able to recognize a change in RSSI, thus tracking the malicious node through the network. The mechanism developed will aid in the localization and capture of cyber criminals by removing their anonymity. Also since data was collected at all phases of localization, evidence was gathered which can be used for prosecution purposes in a court of law. ^

Subject Area

Engineering, Electronics and Electrical

Recommended Citation

Didar S Sohi, "The design of a localization and tracking system for an identified client process in a given internal wireless network" (2007). ETD Collection for Tennessee State University. Paper AAI3290738.