{"id":1484,"date":"2023-02-25T03:26:42","date_gmt":"2023-02-25T03:26:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1484"},"modified":"2023-02-25T03:26:42","modified_gmt":"2023-02-25T03:26:42","slug":"mobil-sensor-wifi-indendors-lokalisering","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/","title":{"rendered":"Mobil sensorik: Indend\u00f8rs WiFi-lokalisering"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"introduction\">Introduktion<\/h2>\n\n\n<p>I de senere \u00e5r er sp\u00f8rgsm\u00e5let om placering blevet mere og mere vigtigt. Tjenester som Google Maps har gjort det nemt at navigere og lokalisere specifikke punkter overalt i verden ved hj\u00e6lp af satellitter. Da disse systemer allerede fungerer pr\u00e6cist udend\u00f8rs, er n\u00e6ste skridt at anvende lignende teknologi indenfor bygninger, s\u00e5som museer eller kommercielle centre. Analoge systemer kan guide folk til interessante steder, s\u00e5som et kunstv\u00e6rk p\u00e5 et museum, eller tilbyde indhold baseret p\u00e5 placering, s\u00e5som reklamer, n\u00e5r man passerer en butik i et indk\u00f8bscenter. Men i lukkede milj\u00f8er er satellitpr\u00e6cisionen lav, hvilket g\u00f8r det n\u00f8dvendigt at ty til andre teknologier for effektiv positionering.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"indoor-location-technology\">Indend\u00f8rs Lokationsteknologi<\/h2>\n\n\n<p>Indend\u00f8rs lokationsbaserede tjenester har skabt stor interesse p\u00e5 grund af deres sociale og monet\u00e6re betydning, med en forventet markedsv\u00e6rdi p\u00e5 10 milliarder dollars inden 2020. P\u00e5 grund af GPS' ineffektivitet i indend\u00f8rs milj\u00f8er er alternative teknologier som WiFi eller Bluetooth n\u00f8dvendige. Beacons sender altid et signal, der kan opfanges af andre BLE-kompatible enheder. De er gode til positioneringssystemer, fordi de er billige, bruger mindre energi og er nemme at s\u00e6tte op. Eksisterende anvendelser af forskellige indend\u00f8rs sporingsalgoritmer, der bruger tr\u00e5dl\u00f8se teknologier, er dog ofte un\u00f8jagtige. Algoritmer baseret p\u00e5 RSSI-m\u00e5linger i WiFi-netv\u00e6rk er normalt un\u00f8jagtige p\u00e5 grund af den store variation i signalet, der m\u00e5les p\u00e5 hvert tidspunkt. Selvom mange aspekter af WiFi forbedres, har pr\u00e6cisionen stadig en lang vej at g\u00e5.&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wireless-communications\">Tr\u00e5dl\u00f8s kommunikation<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Wireless-Communications-banner-1-1-2.jpg\" alt=\"Tr\u00e5dl\u00f8s kommunikation\" class=\"wp-image-1502\"\/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>I tr\u00e5dl\u00f8s kommunikation er mediet til at sende information altid delt. Dette er en stor forskel fra kablede teknologier. For at undg\u00e5 overlapning af frekvensb\u00e5nd og interferens skal der v\u00e6re strenge regler for, hvordan pladsen bruges. Kommunikationsprotokollerne, der bruges af hver deltagerenhed, er ansvarlige for at koordinere adgangen til mediet. Effektiviteten af et tr\u00e5dl\u00f8st netv\u00e6rk afh\u00e6nger af flere faktorer, herunder antallet af computere, der deler netv\u00e6rket, milj\u00f8forhold, elektromagnetisk interferens, forhindringer og latenstid. <\/p>\n\n\n\n<p>Maksimale dataoverf\u00f8rselshastigheder repr\u00e6senterer aldrig den maksimale \"nyttige\" dataoverf\u00f8rselshastighed, da en del af rammen er optaget af information om adgangskontrol til mediet, flowkontrol, kryptering osv. Den faktiske dataoverf\u00f8rselshastighed er altid under, hvad der er defineret i standarderne. Da tr\u00e5dl\u00f8se netv\u00e6rk udsendes over luften, bliver sikkerhed en kritisk faktor, der kr\u00e6ver godkendelse og datakryptering for at forhindre uautoriseret adgang.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-indoor-localization\">WiFi-indend\u00f8rs lokalisering<\/h2>\n\n\n<p>WiFi, som st\u00e5r for Wireless Fidelity, blev f\u00f8dt ud af behovet for at etablere en tr\u00e5dl\u00f8s forbindelsesmekanisme, der var kompatibel mellem forskellige enheder. Med andre ord er Wi-Fi en tr\u00e5dl\u00f8s teknologi, der g\u00f8r det muligt for brugere at forbinde sig tr\u00e5dl\u00f8st til hinanden gennem enheder, der kaldes Access Points (APs) eller hotspots. Det fungerer generelt p\u00e5 2,4 GHz og 5 GHz frekvenser og blev standardiseret af Institute of Electrical and Electronics Engineers (IEEE). Over \u00e5rene er der udviklet adskillige WiFi-protokolstandarder, der forbedrer flere aspekter af deres forg\u00e6ngere.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-wifi-technology\">Udviklingen af Wi-Fi-teknologi<\/h2>\n\n\n<p>Den f\u00f8rste officielle standard var 802.11b, efterfulgt af 802.11a, 802.11g, 802.11n og 802.11ac. b- og g-versionerne arbejder i 2,4 GHz-b\u00e5ndet og er de mest udbredte. I 2019 blev 802.11ax (kaldet Wi-Fi 6) lanceret, som ansl\u00e5s at have fire gange pr\u00e6stationen af 802.11ac. Mens 5 GHz-netv\u00e6rk opn\u00e5r hurtigere hastigheder end 2,4 GHz, er de mindre effektive til at passere gennem hindringer som v\u00e6gge og m\u00f8bler, hvilket resulterer i en lavere d\u00e6kningsradius. Et gennemsnitligt Wi-Fi-netv\u00e6rk har en r\u00e6kkevidde p\u00e5 300 fod udend\u00f8rs eller 150 fod indend\u00f8rs.<\/p>\n\n\n\n<p>Den st\u00f8rste fordel ved at bruge Wi-Fi-netv\u00e6rk til positionering er, at infrastrukturen allerede er p\u00e5 plads i bygninger. P\u00e5 grund af den hurtige v\u00e6kst i tr\u00e5dl\u00f8se netv\u00e6rk til hjemme- og erhvervsbrug er det almindeligt at finde mere end \u00e9n Wi-Fi-adgangspunkt i en bygning. Disse adgangspunkter kan installeres selvst\u00e6ndigt eller komme fra andre steder i n\u00e6rheden. P\u00e5 den anden side er det st\u00f8rste problem, at 802.11-protokollen ikke blev lavet til at blive brugt p\u00e5 denne m\u00e5de. Hver gang du vil finde ud af, hvor du er, skal du sende beskeder til alle Wi-Fi-adgangspunkter for at anmode om de rigtige oplysninger, hvilket bremser netv\u00e6rket. Det kan ogs\u00e5 ske, at nogle adgangspunkter, der tilh\u00f8rer en tredjepart, blokerer s\u00e5danne anmodninger.<\/p>\n\n\n\n<p>IEEE 802.11 tr\u00e5dl\u00f8se standarder bruger en mediumadgangsprotokol kaldet CSMA\/CA (Carrier Sense Multiple Access with Collision Avoidance). Dens navn ligner det, der bruges i kablede Ethernet-netv\u00e6rk (CSMA\/CD: Carrier Sense Multiple Access with Collision Detection), men dens funktion er anderledes. I det tr\u00e5dl\u00f8se tilf\u00e6lde refererer CA til kollisionsundg\u00e5else, mens det i Ethernet handler om kollisionsdetektering. Wi-Fi-netv\u00e6rk er halvduplex, hvilket betyder, at enheder ikke kan sende og modtage p\u00e5 samme tid p\u00e5 samme radiokanal. En enhed kan ikke \"lytte\" p\u00e5 samme tid, som den sender, og kan derfor ikke opdage kollisioner. P\u00e5 grund af dette brugte IEEE-eksperter en kollisionsundg\u00e5elsesmekanisme, som de kaldte DCF (Distributed Control Function).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-network-security\">WiFi-netv\u00e6rkssikkerhed<\/h2>\n\n\n<p class=\"translation-block\">Da transmissionsmediet er luften, som naturligvis er tilg\u00e6ngelig for enhver enhed, er det afg\u00f8rende at sikre, at adgangen til netv\u00e6rket er begr\u00e6nset til autoriserede enheder. For at opn\u00e5 dette definerer 802.11i-standarden forskellige systemer, s\u00e5som <strong>WEP<\/strong>, <strong>WPA<\/strong> og <strong>WPA2<\/strong>, hvor enheder bruger n\u00f8gler til godkendelse. Access Points sender regelm\u00e6ssigt en annonce, der indeholder <strong>SSID<\/strong> (Service Set Identifier), hvilket g\u00f8r det muligt for brugerne at identificere den korrekte AP og oprette forbindelse til den. Forbindelsesprocessen begynder med en godkendelsesprocedure, hvor en n\u00f8gle genereres. WiFi-netv\u00e6rk har tre typer godkendelse.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Tr\u00e5dbunden Privatlivsn\u00f8gle (WEP)<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>M\u00e5let med dette sikkerhedssystem er at g\u00f8re tr\u00e5dl\u00f8se netv\u00e6rk lige s\u00e5 sikre som kablede. Desv\u00e6rre blev det hurtigt kompromitteret, og dets brug anbefales ikke i \u00f8jeblikket. I starten af autentificeringsprocessen sender klientenheden en ukrypteret tekstbesked, som AP'en krypterer ved hj\u00e6lp af en delt n\u00f8gle og returnerer til klienten. N\u00f8glerne er normalt 128 eller 256 bit. Hovedproblemet med WEP er n\u00f8gleh\u00e5ndtering. Generelt distribueres n\u00f8gler manuelt eller gennem en anden sikker rute. WEP bruger delte n\u00f8gler, hvilket betyder, at den bruger den samme n\u00f8gle til alle klienter, s\u00e5 hvis n\u00f8glen opdages, er alle brugere i fare. For at f\u00e5 n\u00f8glen er det kun n\u00f8dvendigt at lytte, indtil man f\u00e5r returneringen af autentificeringsrammerne. At bruge WEP er bedre end ingenting; n\u00e5r der ikke er noget bedre, er det tilr\u00e5deligt at bruge det. En god anbefaling er at bruge sikkerhed i de \u00f8vre lag, s\u00e5som SSL, TSL-kryptering osv.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Wi-Fi Beskyttet Adgang (WPA)<\/strong><\/li>\n<\/ol>\n\n\n\n<p class=\"translation-block\">For at overvinde WEP's sikkerhedsm\u00e6ssige fejl blev WPA udviklet. Dette system blev designet under WiFi Alliance's beskyttelse og brugte en del af 802.11i-standarden, som senere blev opdateret for at erstatte WEP. Et af de centrale elementer i WPA er <strong>TKIP<\/strong> (Temporal Key Integrity Protocol), som er en del af 802.11i-standarden og fungerer ved at generere dynamiske n\u00f8gler. WPA kan valgfrit bruge <strong>AES-CCMP<\/strong> (Advanced Encryption Standard \u2013 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) som en erstatning for TKIP.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>WPA2\/WPAv2<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Det er i \u00f8jeblikket den bedste tilg\u00e6ngelige teknik til at sikre et WiFi-netv\u00e6rk. Det bruger obligatorisk AES-CCMP og bruges i alle enheder, der produceres i dag.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"standards\">Standarder<\/h2>\n\n\n<p>Vi har i \u00f8jeblikket adgang til forskellige tr\u00e5dl\u00f8se netv\u00e6rk, der giver os forbindelse til de mange enheder, vi bruger dagligt. Forskellige kommunikationsstandarder, der almindeligvis bruges, falder under navnet \u201eWiFi\u201c, herunder:<\/p>\n\n\n\n<p class=\"translation-block\"><strong>802.11a<\/strong>: et tr\u00e5dl\u00f8st netv\u00e6rk med en b\u00e6reb\u00f8lge i 5 GHz ISM-b\u00e5ndet og en dataoverf\u00f8rselshastighed p\u00e5 op til 54 Mbps.<\/p>\n\n\n\n<p>- <strong>802.11b<\/strong>: et tr\u00e5dl\u00f8st netv\u00e6rk med en b\u00e6rer i 2,4 GHz ISM-b\u00e5ndet og en dataoverf\u00f8rselshastighed p\u00e5 op til 11 Mbps. <\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11g<\/strong>: et tr\u00e5dl\u00f8st netv\u00e6rk med en b\u00e6reb\u00f8lge i 2,4 GHz ISM-b\u00e5ndet og en dataoverf\u00f8rselshastighed p\u00e5 op til 54 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11i<\/strong>: godkendelse og kryptering.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11n<\/strong>: et tr\u00e5dl\u00f8st netv\u00e6rk med en b\u00e6rer i 2,4 GHz og 5 GHz ISM-b\u00e5ndet, med dataoverf\u00f8rselshastigheder p\u00e5 op til 600 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11ac<\/strong>: et tr\u00e5dl\u00f8st netv\u00e6rk med en b\u00e6reb\u00f8lge under 6 GHz, med dataoverf\u00f8rselshastigheder p\u00e5 mindst 1 Gbps i multi-station drift og 500 Mbps i en enkelt forbindelse.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">Bundlinjen<\/h2>\n\n\n<p>At holde dit WiFi-netv\u00e6rk sikkert er som at holde din hovedd\u00f8r l\u00e5st\u2014du vil jo ikke have, at hvem som helst bare g\u00e5r ind, vel? Selvom Wired-Equivalent Privacy (WEP) engang var en mulighed for at sikre dit netv\u00e6rk, er det nu for\u00e6ldet og har kendte s\u00e5rbarheder. Wi-Fi Protected Access (WPA) og dets efterf\u00f8lger, WPA2\/WPAv2, er langt mere effektive sikkerhedsforanstaltninger. Forskellige WiFi-kommunikationsstandarder tilbyder forskellige dataoverf\u00f8rselshastigheder og frekvenser, s\u00e5 det er vigtigt at v\u00e6lge den rigtige til dine behov. Ved at tage disse forholdsregler kan du holde dit WiFi-netv\u00e6rk sikkert uden at g\u00e5 p\u00e5 kompromis med tr\u00e5dl\u00f8s bekvemmelighed.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduktion I de senere \u00e5r er sp\u00f8rgsm\u00e5let om placering blevet stadig vigtigere. Tjenester som Google Maps har gjort det nemt at navigere og lokalisere specifikke punkter hvor som helst i... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/\">Read more <span class=\"screen-reader-text\">Mobil sensorik: Indend\u00f8rs WiFi-lokalisering<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Sensing: WiFi Indoor Localization | Security Briefing<\/title>\n<meta name=\"description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Mobile Sensing: WiFi Indoor Localization\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"name\":\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"description\":\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Mobile Sensing WiFi Indoor Localization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Sensing: WiFi Indoor Localization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/da\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobil sensing: WiFi-indend\u00f8rs lokalisering | Sikkerhedsbriefing","description":"Hold dit WiFi-netv\u00e6rk sikkert med WEP, WPA eller WPA2. L\u00e6r om kommunikationsstandarder og mere for optimale dataoverf\u00f8rselshastigheder.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/","og_locale":"da_DK","og_type":"article","og_title":"Mobile Sensing: WiFi Indoor Localization | Security Briefing","og_description":"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.","og_url":"https:\/\/securitybriefing.net\/da\/teknologi\/mobil-sensor-wifi-indendors-lokalisering\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T03:26:42+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"security","Estimeret l\u00e6setid":"7 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Mobile Sensing: WiFi Indoor Localization","datePublished":"2023-02-25T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","articleSection":["Tech"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","url":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","name":"Mobil sensing: WiFi-indend\u00f8rs lokalisering | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","datePublished":"2023-02-25T03:26:42+00:00","description":"Hold dit WiFi-netv\u00e6rk sikkert med WEP, WPA eller WPA2. L\u00e6r om kommunikationsstandarder og mere for optimale dataoverf\u00f8rselshastigheder.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","width":662,"height":327,"caption":"Mobile Sensing WiFi Indoor Localization"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Mobile Sensing: WiFi Indoor Localization"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sikkerhed","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin er seniorskribent for Government Technology. Hun har tidligere skrevet for PYMNTS og The Bay State Banner og har en BA i kreativ skrivning fra Carnegie Mellon. Hun bor uden for Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/da\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}