{"id":57,"date":"2002-11-27T11:18:00","date_gmt":"2002-11-27T19:18:00","guid":{"rendered":"http:\/\/www.netjeff.com\/wp\/?p=57"},"modified":"2007-12-30T16:46:35","modified_gmt":"2007-12-31T00:46:35","slug":"using-device-location-for-wireless-security","status":"publish","type":"post","link":"https:\/\/www.netjeff.com\/wp\/?p=57","title":{"rendered":"Using device location for wireless security"},"content":{"rendered":"<p>What if you used the <em><strong>location<\/strong><\/em> of a wireless device as part of authentication\/authorization?<\/p>\n<blockquote><p><strong> Location-based security for wireless apps (Nov 2002)<\/strong><br \/>\n<a href=\"http:\/\/www-106.ibm.com\/developerworks\/wireless\/library\/wi-loc\/\">http:\/\/www-106.ibm.com\/developerworks\/w<wbr><\/wbr>ireless\/library\/wi-loc\/<\/a><\/p>\n<p>However for this to solve any problems, the location technology would have to be network-based not device based. You can't use device-based location (like GPS), because the problem is that you don't trust the device in the first place; you can't be sure that somebody isn't spoofing their location in the device's response. So passive (for the device) network-based solutions (triangulation, time difference of arrival, RF fingerprinting, &#8230;) are the only ones you can rely on because they are much harder to \"spoof\".<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>What if you used the location of a wireless device as part of authentication\/authorization? Location-based security for wireless apps (Nov 2002) http:\/\/www-106.ibm.com\/developerworks\/wireless\/library\/wi-loc\/ However for this to solve any problems, the location technology would have to be network-based not device based. You can't use device-based location <a class=\"more-link\" href=\"https:\/\/www.netjeff.com\/wp\/?p=57\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-57","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57"}],"version-history":[{"count":0,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/57\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}