Method and apparatus for detecting and locating intrusion in a wireless network
First Claim
Patent Images
1. Method for detecting and locating intrusion in a wireless network, comprising the steps of:
- receiving an intruding radio frequency signal by a plurality of receivers;
measuring the received signal strength Ri on each of said plurality of receivers;
for each paired combination of said plurality of receivers, computing one relative distance measurement d to the location of said transmitting source,said one relative distance measurement d being a function of said received signal strength Ri of each said receiver in each said paired combination;
for each paired combination of said plurality of receivers, computing the possible locations of said transmitting source lying on the locus of points satisfying
d=[R1/R2]1/2;
further comprising;
computing the displacement c of the center of said locus from the first receiver in each said paired combination;
computing the radius r of said locus;
and,computing the point about which said locus is centered;
computing the intermediate points of intersection of all said loci corresponding to all said paired combinations; and
computing the actual points of intersection from said intermediate points of intersection of all said loci of points so as to determine an unambiguous location of said transmitting source.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and apparatus for locating an intruding radio frequency signal in a wireless network. Relative distance measurements are computed between pairs of receivers from a plurality of receivers to the source of the intruding signal based on received signal strength. Loci of possible locations are plotted, points of intersection are determined, and a clustering algorithm is applied, yielding the location of the source of the intruding signal. The invention is distinguished in that its operation does not require knowledge of either the transmitted power or antenna gain of the intruding signal source.
-
Citations
33 Claims
-
1. Method for detecting and locating intrusion in a wireless network, comprising the steps of:
-
receiving an intruding radio frequency signal by a plurality of receivers; measuring the received signal strength Ri on each of said plurality of receivers; for each paired combination of said plurality of receivers, computing one relative distance measurement d to the location of said transmitting source, said one relative distance measurement d being a function of said received signal strength Ri of each said receiver in each said paired combination; for each paired combination of said plurality of receivers, computing the possible locations of said transmitting source lying on the locus of points satisfying
d=[R1/R2]1/2;further comprising; computing the displacement c of the center of said locus from the first receiver in each said paired combination; computing the radius r of said locus; and, computing the point about which said locus is centered; computing the intermediate points of intersection of all said loci corresponding to all said paired combinations; and computing the actual points of intersection from said intermediate points of intersection of all said loci of points so as to determine an unambiguous location of said transmitting source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for detecting and locating intrusion in a wireless network, comprising:
-
a computer processor; a plurality of radio frequency receivers; a means for each of said plurality of said radio frequency receivers to communicate a received signal strength indication (RSSI) with said computer processor; and a software program residing in said computer processor; wherein said software program comprises computer-executable instructions, stored on computer-readable media, and wherein said instructions, when executed by said computer processor, provide means for; receiving an intruding radio frequency signal by a plurality of receivers; measuring the received signal strength Ri on each of said plurality of receivers; for each paired combination of said plurality of receivers, computing one relative distance measurement d to the location of said transmitting source, said one relative distance measurement d being a function of said received signal strength Ri of each said receiver in each said paired combination; for each paired combination of said plurality of receivers, computing the possible locations of said transmitting source lying on the locus of points satisfying
d=[R1/R2]1/2;further comprising; computing the displacement c of the center of said locus from the first receiver in each said paired combination; computing the radius r of said locus; and, computing the point about which said locus is centered; computing the intermediate points of intersection of all said loci corresponding to all said paired combinations; and computing the actual points of intersection from said intermediate points of intersection of all said loci of points so as to determine an unambiguous location of said transmitting source. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. Apparatus for locating transmitting sources of a radio frequency (RF) signal intrusion into a wireless network, comprising:
-
a computer network; a plurality of wireless intrusion detection processors; said wireless intrusion detection processor being in communication with said computer network and all elements connected thereto; said wireless intrusion detection processor further comprising at least one wireless intrusion detection sensor for measuring received signal strength of said transmitting sources; said at least one wireless intrusion detection sensor further comprising a first software program comprising computer-executable instructions, stored on computer-readable media, and wherein said instructions, when executed, provide means for; receiving intruding radio frequency signals; measuring the received signal strength Ri of each of said intruding radio frequency signals; communicating said measured signal strength Ri of each of said intruding radio frequency signals to said wireless intrusion detection processor within which it resides; a wireless intrusion detection concentrator processor; said wireless intrusion detection concentrator processor being in communication with said computer network and all elements connected thereto; said wireless intrusion detection concentrator processor further comprising a second software program comprising computer-executable instructions, stored on computer-readable media, and wherein said instructions, when executed, provide means for; for each paired combination of wireless intrusion detection sensors, computing one relative distance measurement d to the location of said transmitting sources; said one relative distance measurement d being a function of said received signal strength Ri of each said wireless intrusion detection sensor in each said paired combination; for each paired combination of said wireless intrusion detection sensors, computing the possible locations of said transmitting sources lying on the locus of points satisfying
d=[R1/R2]1/2further comprising; computing the displacement c of the center of said locus from the first receiver in each said paired combination; computing the radius r of said locus; and, computing the point about which said locus is centered; computing the intermediate points of intersection of all said loci corresponding to all said paired combinations; and computing the actual points of intersection from said intermediate points of intersection of all said loci of points so as to determine an unambiguous location of said transmitting source; and an enterprise security management processor; said enterprise security management processor being in communication with said computer network and all elements connected thereto; said enterprise security management processor further comprising a third software program comprising computer-executable instructions, stored on computer-readable media, and wherein said instructions, when executed, provide means for; displaying the geospace within which said wireless intrusion detection processors are located; receiving and logging intrusion alerts; and displaying intrusion time, location, signal strength and location of each said transmitting source of radio frequency (RF) signal intrusion. - View Dependent Claims (30, 31, 32, 33)
-
Specification