SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 1
WIRELESS DEVICE POSITIONINGAND FINDING
INTRUDER USING RSS
Franklin Alex Joseph Sharmila
Asst. Professor/EEE Asst.Professor/CSE
St. Joseph’s college of engineering and technology, Tanjore. St. Joseph’s college of engineering and technology,
afranklin.alex@gmail.com rsharmi2415@gmail.com
Abstract - Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less
secure than wired connections (such as Ethernet) because an intruder does not need a physical connection. By any
chance if the wireless device attacked by intruder it is hard to locate the device. Locating a wireless device in a Wi-Fi
network by calculating the distance of each node and localize the wireless accurately. A common measure to deter
unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the
casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID
query. Another method is to only allow computers with known MAC addresses to join the network. The robust location
estimation assumes the reference location in the target environment, the proposed location system maps the input to the
physical location using RSS algorithm. In SSID is the application software used to list the set of wireless device available
in the surrounding and it used to create a gpx file. Converting gpx file in a table format for further distance estimation.
Keywords- Wi-Fi, mobile phone positioning, RSS (Received Signal Strength),SSID(Signal Strength Identifier),
MAC (Media Access Control) .
I.INTRODUCTION
Wireless device positioning system proposes an attack-resistant that uses a robust location estimation model. Unlike the
product model, the proposed algorithm assumes that reliable observations may be any RSS or RSS combinations that
belongs to the complete set. In Wi-Fi network it captures more robust location information because it offers a tolerance of
all possible attack conditions. And it includes conducted in an actual Wi-Fi network. Actual Wi-Fi RSS data was collected
to build a location system and a linear attack model that simulated various attacks on RSS. It includes the module for Xml
to RDMS file, Location bases RSS, Intrusion Detection and Analysis. Many wireless localization algorithms based on
different physical characteristics including received signal strength (RSS), time of flight, and angle or directional of arrival.
Of these characteristics, RSS is the most attractive because reading RSS is economical and compatible with existing
wireless networks.
Since estimations of position are often required for vital location-based services, such as assessment of secret
document, positioning systems are becoming tempting targets for attacks. An attacker could easily prevent RSS based
location systems from working correctly by altering the propagation environment, modifying the RSS readings,
manipulating the transmitted power, or broadcasting false messages. Unfortunately, traditional security methods such as
authentication and encryption keys cannot isolate physical RSS-based attacks, making defense against such attacks difficult.
For this reason, researchers have devoted considerable research to designing robust location systems that provide valid
location information resistant to malicious attacks. Most existing IDS are optimized to detect attacks with high accuracy.
However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has
been done to analyze IDS in Wi-Fi network. RSS is the most attractive because reading RSS is economical and compatible
with existing wireless networks. The assignment of the alert to an existing component is not accepted in any case, only if
the quality of the model increases or does not decrease too much. The personal network security access of the wireless
device will not be recognized and it will not be open in wireless network infrastructure.
IDS was not containing the robust location identification so not efficient to get the cleaned data and normal data.
Distance estimation value of the wireless device shown the approximate target destination. IDS optimize to detect attack in
high accuracy in wireless network if only the quality rate of the device is in high range. In this proposed system, The Robust
location estimation system propose a novel technique for proposed attack-resistant which is based on a dynamic,
probabilistic model of the current attack situation. To evaluate the effectiveness of the proposed attack-resistant location by
using RSS algorithm, this included experiments conducted in an actual. Wi-Fi network and here analyzed three different
data sets and showed that xml file conversion, Filtering individual devices by MAC address, experimental analysis using
graph. In all cases, the amount of data could be reduced substantially. Actual Wi-Fi RSS data was collected to build a
location estimation system and a linear attack model that simulated various attacks on RSS.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 2
Using RSS was present the robust location estimation so efficiently get the cleaned data and normal data. This location
estimation system was present RSS algorithm so predict the malicious attack in wireless network. Map the device in the
infrastructure accurately and used to find the intruded device by giving threshold value manually.
II. PROPOSED ALGORITHM
A. PROBLEM FORMULATION:
The wireless device senses N base stations (BSs), then RSS can be represented by a vector X with N elements as
X=(x1,x2,···,xN), where xn is the RSS from the nth BS. An RSS-based location system regards X as an input and outputs the
estimated location through a previously constructed RSS-location relationship. However, the presence of an attacker or
unreliable BSs may make some xn very unreliable and inaccurately estimate the position of the user. The problem in secure
localization is how to accurately locate the user given X, which contains both un attacked (reliable) and attacked
(unreliable) measurements.
B.DISTANCE ESTIMATION:
The RSS value from the insider application and also the quality rate of individual wireless device are stored in a
XML based log file with the identity of each device (SSID), MAC Address, speed, longitude point, latitude point, time and
date of the device when it is logged. The XML log files are then converted into a RDBMS table for the user recognition.
‘BETWEEN’ is the keyword used the get the value from the entity to display it in a table. If we want to get the value of
SSID name from the log file means,
Stringname Contains("<SSID>") ssidname = Between(Stringname, "<SSID>", "</SSID>");
From these we can get the values from the log file and implement it into the table. To evaluate the distance of the
available device in the wi-fi network, pick the RSS value and quality rate from the table for each device available in the
slot. The appropriate distance can be evaluate
rss * rss / quality * 1.92 / 2
By the formulae given. The received signal strength give the radio signal frequency and the quality rate gives the
performance of the wireless device and range of usage based on the device quality. After these estimation the distance can
be calculated and displayed in sq.ft
III. EXPERIMENTAL SETUP AND RESULTS
A. XML TO RDBMS FILE.
The user can be entering into the Wi-Fi user will log on to the services/ then the user will use the services. The
authorized user will be entered into the Wi-Fi services unauthorized user cannot be accessing the services. The services can
be based on the device available currently. Then take the overall log files of the user enter into the Wi-Fi based services and
clustered the user enter into the Wi-Fi services. These clustering processes of the user log files can be processing as the unit
process. The input file in the form of xml files and the file can be clustered and the file in the form of RDMS format.
B. FILE LOCATION BASED ON RSS.
In this pattern extraction the direction of the path can be identified and accessing the data in the online services in
the WI-FI and identified in the cleaned training data. In this path direction the particular services can be provided and the
particular data can be passed by the way of the online based services and it can be auditing the entire clean data and identify
the pattern of the path and also identify any other possible attacks can be identified and getting the location information in
this particular model based on RSS.
C. INTRUSION DETECTION
The localization information of the path in the model and getting information in the clean dataset and also identify
the possible alert in the online services can be identified and other alert based on the attack can be identified by the possible
attacks by using alert services. In this alert based services the different types of alert based on the online services of the data
sending path in the services. Comparing the different messages and it can be stored in the buffer. Then the possible location
information can be identified by this model and also the possible attacks in the Wi-Fi based online services and increasing
the performance of the received signal of the sending data and the possible attacks can be reduced in the online services
and sending the secured data without any major attack in the services.
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 3
In that particular time thousands of attacks can be spread it can be reduced by inclusive disjunction model and
increased the performance of the online services in the WI-FI. e.g. DDOS Attack in the online services.
D. PERFORMANCE ANALYSIS
In this the localization information can be identified by the cleaned dataset and identify the path then the possible
attacks can be reduced in the WI-FI based n online services and finding the path which can be in the secured online services
based on WI-FI.in this overall attack can be identified in the cleared dataset and optimized location can be identified
without any external attack in the online services. Compared to the other network services the performance can be increased
in the online services compatible and increased the computation performance with online services. Now the performance of
the computation time can be less compared to all other networking services and increased the received signal strength.
Fig. 1. System architectural diagram for wireless device positioning in Wi-Fi network.
IV. CONCLUSION:
Wireless positioning in Wi-Fi network system proposes an attack-resistant robust location estimation that uses a
probabilistic inclusive disjunction model. The advantage of this approach is that, as a small probability contributes little to
the inclusive disjunction model, this model allows an attacked observation to play a less significant role in the localization
process, thus achieving more robust location estimations under security threats. To evaluate the effectiveness of this attack-
resistant location estimation analyzed actual Wi-Fi RSS data, developed a robust location system, and simulated various
attacks on RSS using a linear attack model. Finally the wireless positioning approach achieved better robustness than
cluster based, distance based, and device based under various attacks on RSS.
V. FUTURE ENHANCEMENT:
In future the robust location of a wireless device in a wireless network can be reach the distance in a high range.
By increasing the range of Wi-Fi, And to localize any device which is in too far of distance. A wireless access point (AP) is
a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually
connects to a router (via a wired network) if it's a standalone device, or is part of a router itself. In future this robust location
estimation is applied in a sense means then the localization of the intruded device in a wireless network can be positioned
easily. Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks.
However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings using
multiple WAPs. In such an environment, there is an overcome need for signal overlap becomes an issue causing
interference, which results in signal drop page and data errors. Quality rate of the wireless device can also be localized
accurately.
AUTHENTICATOR
CONVERTING XML TO
RDMS FILE
FINDING THE RSS BASED LOCATION INFORMATION FOR
EFFICIENT TRANSFER OF DATA
ATTACKS CAN
BE BASED ON
INTRUSION
DETECTION
ALERT
ANALYSIS AND
IDENTIFIED THE
OPTIMISED
SOLUTION &
DISPLAY GRAPH
International Journal of Innovative Research in Advanced Engineering (IJIRAE)
Volume 1, Issue 1 (March 2014)
ISSN: 2278-2311 IJIRAE | http://ijirae.com
© 2014, IJIRAE – All Rights Reserved Page - 4
REFERENCES
[1] J. Cleary et al., “High precision traffic measurement,” IEEE Communication Mag., vol. 40, no. 3, pp. 167–173, Mar. 2002.
[2] P. Ferrari, A. Flammini, D. Marioli, and A. Taroni, “A new distributed instrument for real time Ethernet networks: Experimental
tests and characterization,” in Proc. ETFA2007, IEEE Int. Conf. Emerging Technologies and Factory Automation, Patras, Greece,
2007, pp. 524–531.
[3] Gold smith A J, Wicker S B. Design Challenges for Energy Constrained Ad hoc Wireless Network [ J ]. IEEE Wireless
Communications, 2002, 9(8):8 26
[4] DAI S J, JING X R, LI L N. Research and analysis on routing protocols for wireless sensor networks [A]. Communications, Circuits
and Systems, 2005. Proceedings[C]. 2005 International Conference on Colume 1, 27-30 May 2005. Page(s):407 – 411
[5] S. Vitturi, “On the use of Ethernet at low level of factory communication systems,” Comp. Std. and Interfaces, vol. 23, pp. 267- 277,
2001.
[6] OMRON Corporation, SYSMAC CS/CJ Series Ethernet Units Operational Manual. Kyoto, Japan: cat. no. W343-E1-06, 2005.
[7] L. Yong, M.J Lee, T.N. Saadawi. A Bluetooth scatternet-route structure for multi-hop adhoc networks. Selected Areas in
Communications. IEEE Journal, Vol.21, pages 229-239, Issue: 2, Feb. 2003
[8] X. Zhang, G.F. Riley. Bluetooth Simulations for Wireless Sensor Networks using GTNetS. 12th IEEE/ACM International
Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Oct. 2004.
[9] J. Elson and D. Estrin. Time Synchronization for Wireless Sensor Networks. Int’l. Parallel and Distrib. Processing Symp., Wksp.
Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., San Francisco, CA, Apr. 2001.

More Related Content

What's hot

Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...IEEEGLOBALSOFTTECHNOLOGIES
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hackingijtsrd
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
710201940
710201940710201940
710201940IJRAT
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...AM Publications
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET-  	  Robustness Strategy for Securing Data from Cyber AttacksIRJET-  	  Robustness Strategy for Securing Data from Cyber Attacks
IRJET- Robustness Strategy for Securing Data from Cyber AttacksIRJET Journal
 

What's hot (20)

Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
IJAEIT 20
IJAEIT 20IJAEIT 20
IJAEIT 20
 
Data Prevention from Network Hacking
Data Prevention from Network HackingData Prevention from Network Hacking
Data Prevention from Network Hacking
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
710201940
710201940710201940
710201940
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...A Comparative Study for Source Privacy Preserving and Message Authentication ...
A Comparative Study for Source Privacy Preserving and Message Authentication ...
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
C0363012014
C0363012014C0363012014
C0363012014
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
IRJET-  	  Robustness Strategy for Securing Data from Cyber AttacksIRJET-  	  Robustness Strategy for Securing Data from Cyber Attacks
IRJET- Robustness Strategy for Securing Data from Cyber Attacks
 

Viewers also liked

Оценка процесса обслуживания как фактора эффективности воронки продаж
Оценка процесса обслуживания как фактора эффективности воронки продажОценка процесса обслуживания как фактора эффективности воронки продаж
Оценка процесса обслуживания как фактора эффективности воронки продажAssociationAMKO
 
Whitepaper Ga registratiedruk en administratie laten te lijf
Whitepaper Ga registratiedruk en administratie laten te lijfWhitepaper Ga registratiedruk en administratie laten te lijf
Whitepaper Ga registratiedruk en administratie laten te lijfXavier Geerdink
 
Google Project
Google ProjectGoogle Project
Google Projectwheelrzzzz
 
SSR Damping Using GCSC and TCSC in Wind Farms
SSR Damping Using GCSC and TCSC in Wind FarmsSSR Damping Using GCSC and TCSC in Wind Farms
SSR Damping Using GCSC and TCSC in Wind FarmsAM Publications
 
role of distributed generation
role of distributed generation role of distributed generation
role of distributed generation Jitendra Bhadoriya
 
Sari-Sari Store Festival: Through the years
Sari-Sari Store Festival: Through the yearsSari-Sari Store Festival: Through the years
Sari-Sari Store Festival: Through the yearsPrworks VisMin
 
CA 3.04 Heliocentrism
CA 3.04 HeliocentrismCA 3.04 Heliocentrism
CA 3.04 HeliocentrismStephen Kwong
 
Dziwana Matilda Shawa CV 1
Dziwana Matilda Shawa CV 1Dziwana Matilda Shawa CV 1
Dziwana Matilda Shawa CV 1Dziwana Shawa
 

Viewers also liked (11)

Оценка процесса обслуживания как фактора эффективности воронки продаж
Оценка процесса обслуживания как фактора эффективности воронки продажОценка процесса обслуживания как фактора эффективности воронки продаж
Оценка процесса обслуживания как фактора эффективности воронки продаж
 
C.V Mrs A Gater
C.V Mrs A GaterC.V Mrs A Gater
C.V Mrs A Gater
 
Whitepaper Ga registratiedruk en administratie laten te lijf
Whitepaper Ga registratiedruk en administratie laten te lijfWhitepaper Ga registratiedruk en administratie laten te lijf
Whitepaper Ga registratiedruk en administratie laten te lijf
 
Triadimenol 55219-65-3-api
Triadimenol 55219-65-3-apiTriadimenol 55219-65-3-api
Triadimenol 55219-65-3-api
 
Google Project
Google ProjectGoogle Project
Google Project
 
SSR Damping Using GCSC and TCSC in Wind Farms
SSR Damping Using GCSC and TCSC in Wind FarmsSSR Damping Using GCSC and TCSC in Wind Farms
SSR Damping Using GCSC and TCSC in Wind Farms
 
Pefloxacin 70458-92-3-api
Pefloxacin 70458-92-3-apiPefloxacin 70458-92-3-api
Pefloxacin 70458-92-3-api
 
role of distributed generation
role of distributed generation role of distributed generation
role of distributed generation
 
Sari-Sari Store Festival: Through the years
Sari-Sari Store Festival: Through the yearsSari-Sari Store Festival: Through the years
Sari-Sari Store Festival: Through the years
 
CA 3.04 Heliocentrism
CA 3.04 HeliocentrismCA 3.04 Heliocentrism
CA 3.04 Heliocentrism
 
Dziwana Matilda Shawa CV 1
Dziwana Matilda Shawa CV 1Dziwana Matilda Shawa CV 1
Dziwana Matilda Shawa CV 1
 

Similar to WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...IRJET Journal
 
A030101001006
A030101001006A030101001006
A030101001006theijes
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET Journal
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Conference Papers
 
Mobile security using wi fi signal strength
Mobile security using wi fi signal strengthMobile security using wi fi signal strength
Mobile security using wi fi signal strengtheSAT Publishing House
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)CSCJournals
 
IRJET- Indoor Positioning System
IRJET-  	  Indoor Positioning SystemIRJET-  	  Indoor Positioning System
IRJET- Indoor Positioning SystemIRJET Journal
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 

Similar to WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS (20)

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
IRJET- Malicious User Detection and Localization of Wifinetwork in Wirelessne...
 
A030101001006
A030101001006A030101001006
A030101001006
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
 
Mobile security using wi fi signal strength
Mobile security using wi fi signal strengthMobile security using wi fi signal strength
Mobile security using wi fi signal strength
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Indoor navigation system
Indoor navigation systemIndoor navigation system
Indoor navigation system
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)
 
IRJET- Indoor Positioning System
IRJET-  	  Indoor Positioning SystemIRJET-  	  Indoor Positioning System
IRJET- Indoor Positioning System
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

WIRELESS DEVICE POSITIONING AND FINDING INTRUDER USING RSS

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 1 WIRELESS DEVICE POSITIONINGAND FINDING INTRUDER USING RSS Franklin Alex Joseph Sharmila Asst. Professor/EEE Asst.Professor/CSE St. Joseph’s college of engineering and technology, Tanjore. St. Joseph’s college of engineering and technology, afranklin.alex@gmail.com rsharmi2415@gmail.com Abstract - Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular. Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does not need a physical connection. By any chance if the wireless device attacked by intruder it is hard to locate the device. Locating a wireless device in a Wi-Fi network by calculating the distance of each node and localize the wireless accurately. A common measure to deter unauthorized users involves hiding the access point's name by disabling the SSID broadcast. While effective against the casual user, it is ineffective as a security method because the SSID is broadcast in the clear in response to a client SSID query. Another method is to only allow computers with known MAC addresses to join the network. The robust location estimation assumes the reference location in the target environment, the proposed location system maps the input to the physical location using RSS algorithm. In SSID is the application software used to list the set of wireless device available in the surrounding and it used to create a gpx file. Converting gpx file in a table format for further distance estimation. Keywords- Wi-Fi, mobile phone positioning, RSS (Received Signal Strength),SSID(Signal Strength Identifier), MAC (Media Access Control) . I.INTRODUCTION Wireless device positioning system proposes an attack-resistant that uses a robust location estimation model. Unlike the product model, the proposed algorithm assumes that reliable observations may be any RSS or RSS combinations that belongs to the complete set. In Wi-Fi network it captures more robust location information because it offers a tolerance of all possible attack conditions. And it includes conducted in an actual Wi-Fi network. Actual Wi-Fi RSS data was collected to build a location system and a linear attack model that simulated various attacks on RSS. It includes the module for Xml to RDMS file, Location bases RSS, Intrusion Detection and Analysis. Many wireless localization algorithms based on different physical characteristics including received signal strength (RSS), time of flight, and angle or directional of arrival. Of these characteristics, RSS is the most attractive because reading RSS is economical and compatible with existing wireless networks. Since estimations of position are often required for vital location-based services, such as assessment of secret document, positioning systems are becoming tempting targets for attacks. An attacker could easily prevent RSS based location systems from working correctly by altering the propagation environment, modifying the RSS readings, manipulating the transmitted power, or broadcasting false messages. Unfortunately, traditional security methods such as authentication and encryption keys cannot isolate physical RSS-based attacks, making defense against such attacks difficult. For this reason, researchers have devoted considerable research to designing robust location systems that provide valid location information resistant to malicious attacks. Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in Wi-Fi network. RSS is the most attractive because reading RSS is economical and compatible with existing wireless networks. The assignment of the alert to an existing component is not accepted in any case, only if the quality of the model increases or does not decrease too much. The personal network security access of the wireless device will not be recognized and it will not be open in wireless network infrastructure. IDS was not containing the robust location identification so not efficient to get the cleaned data and normal data. Distance estimation value of the wireless device shown the approximate target destination. IDS optimize to detect attack in high accuracy in wireless network if only the quality rate of the device is in high range. In this proposed system, The Robust location estimation system propose a novel technique for proposed attack-resistant which is based on a dynamic, probabilistic model of the current attack situation. To evaluate the effectiveness of the proposed attack-resistant location by using RSS algorithm, this included experiments conducted in an actual. Wi-Fi network and here analyzed three different data sets and showed that xml file conversion, Filtering individual devices by MAC address, experimental analysis using graph. In all cases, the amount of data could be reduced substantially. Actual Wi-Fi RSS data was collected to build a location estimation system and a linear attack model that simulated various attacks on RSS.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 2 Using RSS was present the robust location estimation so efficiently get the cleaned data and normal data. This location estimation system was present RSS algorithm so predict the malicious attack in wireless network. Map the device in the infrastructure accurately and used to find the intruded device by giving threshold value manually. II. PROPOSED ALGORITHM A. PROBLEM FORMULATION: The wireless device senses N base stations (BSs), then RSS can be represented by a vector X with N elements as X=(x1,x2,···,xN), where xn is the RSS from the nth BS. An RSS-based location system regards X as an input and outputs the estimated location through a previously constructed RSS-location relationship. However, the presence of an attacker or unreliable BSs may make some xn very unreliable and inaccurately estimate the position of the user. The problem in secure localization is how to accurately locate the user given X, which contains both un attacked (reliable) and attacked (unreliable) measurements. B.DISTANCE ESTIMATION: The RSS value from the insider application and also the quality rate of individual wireless device are stored in a XML based log file with the identity of each device (SSID), MAC Address, speed, longitude point, latitude point, time and date of the device when it is logged. The XML log files are then converted into a RDBMS table for the user recognition. ‘BETWEEN’ is the keyword used the get the value from the entity to display it in a table. If we want to get the value of SSID name from the log file means, Stringname Contains("<SSID>") ssidname = Between(Stringname, "<SSID>", "</SSID>"); From these we can get the values from the log file and implement it into the table. To evaluate the distance of the available device in the wi-fi network, pick the RSS value and quality rate from the table for each device available in the slot. The appropriate distance can be evaluate rss * rss / quality * 1.92 / 2 By the formulae given. The received signal strength give the radio signal frequency and the quality rate gives the performance of the wireless device and range of usage based on the device quality. After these estimation the distance can be calculated and displayed in sq.ft III. EXPERIMENTAL SETUP AND RESULTS A. XML TO RDBMS FILE. The user can be entering into the Wi-Fi user will log on to the services/ then the user will use the services. The authorized user will be entered into the Wi-Fi services unauthorized user cannot be accessing the services. The services can be based on the device available currently. Then take the overall log files of the user enter into the Wi-Fi based services and clustered the user enter into the Wi-Fi services. These clustering processes of the user log files can be processing as the unit process. The input file in the form of xml files and the file can be clustered and the file in the form of RDMS format. B. FILE LOCATION BASED ON RSS. In this pattern extraction the direction of the path can be identified and accessing the data in the online services in the WI-FI and identified in the cleaned training data. In this path direction the particular services can be provided and the particular data can be passed by the way of the online based services and it can be auditing the entire clean data and identify the pattern of the path and also identify any other possible attacks can be identified and getting the location information in this particular model based on RSS. C. INTRUSION DETECTION The localization information of the path in the model and getting information in the clean dataset and also identify the possible alert in the online services can be identified and other alert based on the attack can be identified by the possible attacks by using alert services. In this alert based services the different types of alert based on the online services of the data sending path in the services. Comparing the different messages and it can be stored in the buffer. Then the possible location information can be identified by this model and also the possible attacks in the Wi-Fi based online services and increasing the performance of the received signal of the sending data and the possible attacks can be reduced in the online services and sending the secured data without any major attack in the services.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 3 In that particular time thousands of attacks can be spread it can be reduced by inclusive disjunction model and increased the performance of the online services in the WI-FI. e.g. DDOS Attack in the online services. D. PERFORMANCE ANALYSIS In this the localization information can be identified by the cleaned dataset and identify the path then the possible attacks can be reduced in the WI-FI based n online services and finding the path which can be in the secured online services based on WI-FI.in this overall attack can be identified in the cleared dataset and optimized location can be identified without any external attack in the online services. Compared to the other network services the performance can be increased in the online services compatible and increased the computation performance with online services. Now the performance of the computation time can be less compared to all other networking services and increased the received signal strength. Fig. 1. System architectural diagram for wireless device positioning in Wi-Fi network. IV. CONCLUSION: Wireless positioning in Wi-Fi network system proposes an attack-resistant robust location estimation that uses a probabilistic inclusive disjunction model. The advantage of this approach is that, as a small probability contributes little to the inclusive disjunction model, this model allows an attacked observation to play a less significant role in the localization process, thus achieving more robust location estimations under security threats. To evaluate the effectiveness of this attack- resistant location estimation analyzed actual Wi-Fi RSS data, developed a robust location system, and simulated various attacks on RSS using a linear attack model. Finally the wireless positioning approach achieved better robustness than cluster based, distance based, and device based under various attacks on RSS. V. FUTURE ENHANCEMENT: In future the robust location of a wireless device in a wireless network can be reach the distance in a high range. By increasing the range of Wi-Fi, And to localize any device which is in too far of distance. A wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) if it's a standalone device, or is part of a router itself. In future this robust location estimation is applied in a sense means then the localization of the intruded device in a wireless network can be positioned easily. Most jurisdictions have only a limited number of frequencies legally available for use by wireless networks. However, the limited number of frequencies becomes problematic in crowded downtown areas with tall buildings using multiple WAPs. In such an environment, there is an overcome need for signal overlap becomes an issue causing interference, which results in signal drop page and data errors. Quality rate of the wireless device can also be localized accurately. AUTHENTICATOR CONVERTING XML TO RDMS FILE FINDING THE RSS BASED LOCATION INFORMATION FOR EFFICIENT TRANSFER OF DATA ATTACKS CAN BE BASED ON INTRUSION DETECTION ALERT ANALYSIS AND IDENTIFIED THE OPTIMISED SOLUTION & DISPLAY GRAPH
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1, Issue 1 (March 2014) ISSN: 2278-2311 IJIRAE | http://ijirae.com © 2014, IJIRAE – All Rights Reserved Page - 4 REFERENCES [1] J. Cleary et al., “High precision traffic measurement,” IEEE Communication Mag., vol. 40, no. 3, pp. 167–173, Mar. 2002. [2] P. Ferrari, A. Flammini, D. Marioli, and A. Taroni, “A new distributed instrument for real time Ethernet networks: Experimental tests and characterization,” in Proc. ETFA2007, IEEE Int. Conf. Emerging Technologies and Factory Automation, Patras, Greece, 2007, pp. 524–531. [3] Gold smith A J, Wicker S B. Design Challenges for Energy Constrained Ad hoc Wireless Network [ J ]. IEEE Wireless Communications, 2002, 9(8):8 26 [4] DAI S J, JING X R, LI L N. Research and analysis on routing protocols for wireless sensor networks [A]. Communications, Circuits and Systems, 2005. Proceedings[C]. 2005 International Conference on Colume 1, 27-30 May 2005. Page(s):407 – 411 [5] S. Vitturi, “On the use of Ethernet at low level of factory communication systems,” Comp. Std. and Interfaces, vol. 23, pp. 267- 277, 2001. [6] OMRON Corporation, SYSMAC CS/CJ Series Ethernet Units Operational Manual. Kyoto, Japan: cat. no. W343-E1-06, 2005. [7] L. Yong, M.J Lee, T.N. Saadawi. A Bluetooth scatternet-route structure for multi-hop adhoc networks. Selected Areas in Communications. IEEE Journal, Vol.21, pages 229-239, Issue: 2, Feb. 2003 [8] X. Zhang, G.F. Riley. Bluetooth Simulations for Wireless Sensor Networks using GTNetS. 12th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Oct. 2004. [9] J. Elson and D. Estrin. Time Synchronization for Wireless Sensor Networks. Int’l. Parallel and Distrib. Processing Symp., Wksp. Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., San Francisco, CA, Apr. 2001.