Wireless network security
First Claim
1. A secure wireless network comprising:
- a plurality of receiver nodes coupled to corresponding high-precision clocks and configured to receive unsolicited wireless frames transmitted both from within and outside a secured geographic area covered by the secure wireless network;
a master synchronization high-precision clock coupled to said corresponding high-precision clocks;
a position location system coupled to said receiver nodes and programmed to compute estimated positions for individual ones of wireless nodes transmitting said wireless frames; and
,access management logic coupled to said position location system and configured to manage access to the wireless network by said individual ones of said wireless nodes based upon said computed estimated positions.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is secure wireless network. The secure wireless network can include multiple receiver nodes coupled to corresponding high-precision clocks. Each of the receiver nodes can be configured to receive wireless frames transmitted both within and outside a secured geographic area covered by the secure wireless network. A master synchronization high-precision clock can be coupled to the corresponding high-precision clocks. Additionally, a position location system can be coupled to the receiver nodes. Specifically, the position location system can be programmed to compute estimated positions for individual ones of wireless nodes transmitting the wireless frames. Finally, access management logic can be coupled to the position location system. More particularly, the access management logic can be configured to manage access to the wireless network by the individual ones of the wireless nodes based upon the computed estimated positions.
22 Citations
14 Claims
-
1. A secure wireless network comprising:
-
a plurality of receiver nodes coupled to corresponding high-precision clocks and configured to receive unsolicited wireless frames transmitted both from within and outside a secured geographic area covered by the secure wireless network; a master synchronization high-precision clock coupled to said corresponding high-precision clocks; a position location system coupled to said receiver nodes and programmed to compute estimated positions for individual ones of wireless nodes transmitting said wireless frames; and
,access management logic coupled to said position location system and configured to manage access to the wireless network by said individual ones of said wireless nodes based upon said computed estimated positions. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for securing a wireless network from rogue access by unauthorized wireless nodes attempting to transmit wireless frames onto the wireless network, the method comprising the steps of:
-
synchronizing individual high-precision clocks in different ones of at least four receiver nodes positioned in a secured area contained within said wireless network; receiving an unsolicited wireless frame in at least three of said at least four receiver nodes; responsive to said receipt of said unsolicited wireless frame in each of said receiver nodes, recording a time stamp denoting when said unsolicited wireless frame had been received; for each pair of receiver nodes which have each received said unsolicited wireless frame, comparing said time stamps between said pairs to compute a set of differential hyperbolas; identifying an intersection between said differential hyperbolas to establish a two-dimensional position estimate of a wireless node source of said unsolicited wireless frame; and
,managing access to the wireless network by said wireless node source based upon said position estimate. - View Dependent Claims (8, 9, 10)
-
-
11. A machine readable storage having stored thereon a computer program for securing a wireless network from rogue access by unauthorized wireless nodes attempting to transmit wireless frames onto the wireless network, the computer program comprising a routine set of instructions which when executed by the machine cause the machine to perform the steps of:
-
synchronizing individual high-precision clocks in different ones of at least four receiver nodes positioned in a secured area contained within said wireless network; receiving an unsolicited wireless frame in at least three of said receiver nodes;
responsive to said receipt of said unsolicited wireless frame in each of said receiver nodes, recording a time stamp denoting when said unsolicited wireless frame had been received;for each pair of receiver nodes which have each received said unsolicited wireless frame, comparing said time stamps between said pairs to compute a set of differential hyperbolas; identifying an intersection between said differential hyperbolas to establish a position estimate of a wireless node source of said unsolicited wireless frame; and
,managing access to the wireless network by said wireless node source based upon said position estimate. - View Dependent Claims (12, 13, 14)
-
Specification