1. Estimating User’s Movement Path Using Wi-Fi Authentication Log
- Author
-
Kazuyuki Yamamoto, Yasuhiro Ohtaki, and Jun Yamano
- Subjects
Password ,Authentication ,Computer science ,business.industry ,Controller (computing) ,User identifier ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Roaming ,Authentication server ,business ,Wireless LAN controller ,PATH (variable) ,Computer network - Abstract
In this paper, we propose a method to estimate user’s movement path using Wi-Fi authentication log. Large organization often have many Wi-Fi access points (APs) which are centrally managed by a wireless LAN controller, usually with roaming feature. While the user moves around the area covered by the Wi-Fi network, the AP they connect to will change. Each time the connected AP change, an authentication such as 802.1x is performed. The credentials such as user ID and password are sent to an authentication server via the controller. This allows the controller to know who has connected to which access point and when. Our method is to track a certain person’s movement path from the authentication log afterword. Assuming the authentication log is recorded where the roaming occurred, the area where the device was at point could be estimated. By combining with the structure of the building, we are able to roughly estimate the user’s movement path.
- Published
- 2021
- Full Text
- View/download PDF