Skip to main content

Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries

  • Conference paper
Pervasive Computing (Pervasive 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5538))

Included in the following conference series:

Abstract

We present a means of containing Wi-Fi coverage to physical boundaries that are meaningful to users. We call it geo-fencing. Our approach is based on directional antennas, and our motivation is to provide wireless access and privacy models that are a natural fit with user expectations. To evaluate geo-fencing, we use measurements from an indoor testbed of Wi-Fi nodes and APs with electronically-steerable directional antennas. We find that by combining directionality, power control and coding across multiple APs, we are able to successfully confine Wi-Fi coverage to clients located within target regions of varying shapes and sizes; we can select between nodes located as close as five feet from each other.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001)

    Google Scholar 

  2. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to appear, 2009)

    Google Scholar 

  3. Kapadia, A., Henderson, T., Fielding, J.J., Kotz, D.: Virtual walls: Protecting digital privacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  4. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (September 2007)

    Google Scholar 

  5. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007)

    Google Scholar 

  6. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997)

    Article  Google Scholar 

  7. Sat, B., Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia and Expo., pp. 2153–2156. ACM Press, New York (2006)

    Google Scholar 

  8. Fidelity Comtech, http://www.fidelity-comtech.com/

  9. Charles, R., Ratul, M., Maya, R., David, W., John, Z.: Measurement-based models of delivery and interference in static wireless networks. In: SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 51–62. ACM, New York (2006)

    Google Scholar 

  10. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  11. Aruba, http://www.arubanetworks.com/

  12. Bahl, P., Padmanabhan, V.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), pp. 775–784 (2000)

    Google Scholar 

  13. Haeberlen, A., Flannery, E., Ladd, A.M., Rudys, A., Wallach, D.S., Kavraki, L.E.: Practical robust localization over large-scale 802.11 wireless networks. In: MobiCom 2004: Proceedings of the 10th annual international conference on Mobile computing and networking, pp. 70–84. ACM, New York (2004)

    Google Scholar 

  14. Chandra, R., Padhye, J., Wolman, A., Zill, B.: A location-based management system for enterprise wireless lans. In: Proceedings of the 3rd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), pp. 115–130 (2007)

    Google Scholar 

  15. Bittau, A., Handley, M., Lackey, J.: The final nail in wep’s coffin. In: Symposium on Security and Privacy, pp. 386–400. IEEE Computer Society, Washington (2006)

    Google Scholar 

  16. BeamFlex, http://www.ruckuswireless.com/technology/beamflex.php/

  17. Rappaport, T.: Wireless Communications: Principles and Practice, vol. 2, Reading, Massachusetts (2001)

    Google Scholar 

  18. Patra, R., Nedevschi, S., Surana, S., Sheth, A., Subramanian, L., Brewer, E.: WiLDNet: Design and implementation of high performance wifi based long distance networks. In: 4th USENIX Symposium on Networked Systems Design and Implementation, pp. 87–100 (2007)

    Google Scholar 

  19. Navda, V., Subramanian, A.P., Dhanasekaran, K., Timm-Giel, A., Das, S.: Mobisteer: using steerable beam directional antenna for vehicular network access. In: MobiSys 2007: Proceedings of the 5th international conference on Mobile systems, applications and services, pp. 192–205. ACM, New York (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sheth, A., Seshan, S., Wetherall, D. (2009). Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds) Pervasive Computing. Pervasive 2009. Lecture Notes in Computer Science, vol 5538. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01516-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01516-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01515-1

  • Online ISBN: 978-3-642-01516-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics