Triangulation homes in on rogue WLan access points

    Date30 May 2006
    7866
    Posted ByBenjamin D. Thomas
    Although wireless access points use encryption to secure network traffic, access to the WLan is open to anyone with a valid log-in. Foundry Networks aims to control this access based on the physical location of the end-user. The technology uses triangulation between three access points to determine the location of a WLan user to within five metres, said the company.

    The technique can be used by IT managers to locate and eliminate rogue access points – a common security problem encountered on company networks due to the ease with which access points can be set up.

    Wireless access is a growing threat to corporate security, because of the increased availability and use of wireless devices, said Forrester Research.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com page/section?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    20
    radio
    [{"id":"73","title":"News","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"74","title":"Advisories ","votes":"5","type":"x","order":"2","pct":83.33,"resources":[]},{"id":"75","title":"HOWTOs","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"76","title":"Latest Features ","votes":"1","type":"x","order":"4","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.