2015
DOI: 10.1016/j.comnet.2015.06.015
|View full text |Cite
|
Sign up to set email alerts
|

Survey of WiFi positioning using time-based techniques

Abstract: Estimating the position of mobile devices with high accuracy in indoor environments is of interest across a wide range of applications. Many methods and technologies have been proposed to solve the problem but, to date, there is no "silver bullet". This paper surveys research conducted on indoor positioning using time-based approaches in conjunction with the IEEE 802.11 Wireless Local Area Network standard (WiFi). Location solutions using this approach are particularly attractive due to the wide deployment of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(53 citation statements)
references
References 56 publications
(85 reference statements)
0
48
0
1
Order By: Relevance
“…Through wardriving, we were able to capture publicly available data about each scanned Wi-Fi access point. Data includes: security protocol (WEP, WPA, WPA2 or OPN), channel being used, router manufacturer, SSID and BSSID [2,5]. The route we took throughout our wardrive spans from Beirut to Kaslik as shown in figure 1.…”
Section: War-drivingmentioning
confidence: 99%
See 1 more Smart Citation
“…Through wardriving, we were able to capture publicly available data about each scanned Wi-Fi access point. Data includes: security protocol (WEP, WPA, WPA2 or OPN), channel being used, router manufacturer, SSID and BSSID [2,5]. The route we took throughout our wardrive spans from Beirut to Kaslik as shown in figure 1.…”
Section: War-drivingmentioning
confidence: 99%
“…(1) [10] The threat is the attacker who exploits a certain vulnerability in order to perform all sorts of attacks listed in Table 1. For example, the survey showed that 54.3% of participants do not know how to check who is connected to their Wi-Fi network; this helps the attacker in performing confidentiality (2) and integrity (3) attacks and intercept the network without people knowing. The survey results also showed that 30.2% of participants do not know what a firewall is; this helps the attacker in performing authentication (4) attacks and steal a user's login credentials on a network that isn't protected with a firewall.…”
Section: Risk = Vulnerability * Threatmentioning
confidence: 99%
“…Some IPS-related reviews have over 200 references [17,51,122,65,71,109] or even over 300 references [94]. The insights presented in the rest of this chapter are mainly based on 61 IPS-related survey works [1,48,54,60,84,89,116,119,150,153,3,13,17,19,73,25,26,51,70,91,83,99,118,122,132,143,12,16,21,22,32,65,80,87,95,98,110,121,123,142,152,47,71,90,94,111,112,128,140,159,…”
Section: An Overview Of Ips Solutionsmentioning
confidence: 99%
“…WiFi, or Wi-Fi, is the IEEE standard 802.11 for WLAN [84]. WiFi-based positioning is sometimes addressed by the name of WLAN positioning [16,110,152], which is the result of WiFi being the default technology for setting up a WLAN.…”
Section: Wifimentioning
confidence: 99%
See 1 more Smart Citation