{"id":1484,"date":"2023-02-25T03:26:42","date_gmt":"2023-02-25T03:26:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1484"},"modified":"2023-02-25T03:26:42","modified_gmt":"2023-02-25T03:26:42","slug":"mobil-erzekeles-wifi-belteri-lokalizacio","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/","title":{"rendered":"A mesters\u00e9ges intelligencia, a virtu\u00e1lis val\u00f3s\u00e1g, a k\u00e9szp\u00e9nzmentes fizet\u00e9sek, a dolgok internete \u00e9s sok m\u00e1s inform\u00e1ci\u00f3technol\u00f3giai \u00e1g naponta n\u00f6vekszik. N\u00f6veked\u00e9s\u00fckkel \u00e9s terjeszked\u00e9s\u00fckkel \u00faj fenyeget\u00e9si vektorok \u00e9s sebezhet\u0151s\u00e9gek jelennek meg\u2026"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"introduction\">Bevezet\u00e9s<\/h2>\n\n\n<p>Az elm\u00falt \u00e9vekben a helymeghat\u00e1roz\u00e1s k\u00e9rd\u00e9se egyre fontosabb\u00e1 v\u00e1lt. Az olyan szolg\u00e1ltat\u00e1sok, mint a Google Maps, lehet\u0151v\u00e9 tett\u00e9k, hogy k\u00f6nnyen navig\u00e1ljunk \u00e9s megtal\u00e1ljunk konkr\u00e9t pontokat b\u00e1rhol a vil\u00e1gon m\u0171holdak seg\u00edts\u00e9g\u00e9vel. Mivel ezek a rendszerek m\u00e1r pontosan m\u0171k\u00f6dnek a szabadban, a k\u00f6vetkez\u0151 l\u00e9p\u00e9s az, hogy hasonl\u00f3 technol\u00f3gi\u00e1t alkalmazzunk \u00e9p\u00fcletek belsej\u00e9ben, p\u00e9ld\u00e1ul m\u00fazeumokban vagy bev\u00e1s\u00e1rl\u00f3k\u00f6zpontokban. Az anal\u00f3g rendszerek seg\u00edthetnek az embereknek eljutni \u00e9rdekes helyekre, p\u00e9ld\u00e1ul egy m\u0171alkot\u00e1shoz egy m\u00fazeumban, vagy helyalap\u00fa tartalmat k\u00edn\u00e1lhatnak, p\u00e9ld\u00e1ul rekl\u00e1mokat, amikor elhaladunk egy \u00fczlet mellett egy bev\u00e1s\u00e1rl\u00f3k\u00f6zpontban. Azonban z\u00e1rt k\u00f6rnyezetben a m\u0171holdas pontoss\u00e1g alacsony, ez\u00e9rt m\u00e1s technol\u00f3gi\u00e1kra van sz\u00fcks\u00e9g a hat\u00e9kony pozicion\u00e1l\u00e1shoz.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"indoor-location-technology\">Belt\u00e9ri Helymeghat\u00e1roz\u00e1si Technol\u00f3gia<\/h2>\n\n\n<p>A belt\u00e9ri helyalap\u00fa szolg\u00e1ltat\u00e1sok nagy \u00e9rdekl\u0151d\u00e9st v\u00e1ltottak ki t\u00e1rsadalmi \u00e9s p\u00e9nz\u00fcgyi jelent\u0151s\u00e9g\u00fck miatt, \u00e9s a piac \u00e9rt\u00e9k\u00e9t 2020-ra 10 milli\u00e1rd doll\u00e1rra becs\u00fclik. A GPS belt\u00e9ri k\u00f6rnyezetekben val\u00f3 hat\u00e9konys\u00e1ga miatt alternat\u00edv technol\u00f3gi\u00e1k, p\u00e9ld\u00e1ul a WiFi vagy a Bluetooth sz\u00fcks\u00e9gesek. A jelad\u00f3k mindig k\u00fcldenek egy jelet, amelyet m\u00e1s BLE-kompatibilis eszk\u00f6z\u00f6k felvehetnek. J\u00f3 helymeghat\u00e1roz\u00f3 rendszerek, mert olcs\u00f3k, kevesebb energi\u00e1t haszn\u00e1lnak, \u00e9s k\u00f6nnyen be\u00e1ll\u00edthat\u00f3k. Azonban a k\u00fcl\u00f6nb\u00f6z\u0151 belt\u00e9ri nyomk\u00f6vet\u0151 algoritmusok vezet\u00e9k n\u00e9lk\u00fcli technol\u00f3gi\u00e1kat haszn\u00e1l\u00f3 megl\u00e9v\u0151 alkalmaz\u00e1sai gyakran pontatlanok. A WiFi h\u00e1l\u00f3zatokban az RSSI m\u00e9r\u00e9seken alapul\u00f3 algoritmusok \u00e1ltal\u00e1ban pontatlanok a minden pillanatban m\u00e9rt jel nagy v\u00e1ltoz\u00e9konys\u00e1ga miatt. B\u00e1r a WiFi sz\u00e1mos szempontja javul, a pontoss\u00e1gnak m\u00e9g hossz\u00fa utat kell megtennie.&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wireless-communications\">Vezet\u00e9k N\u00e9lk\u00fcli Kommunik\u00e1ci\u00f3<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Wireless-Communications-banner-1-1-2.jpg\" alt=\"Vezet\u00e9k N\u00e9lk\u00fcli Kommunik\u00e1ci\u00f3\" class=\"wp-image-1502\"\/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A vezet\u00e9k n\u00e9lk\u00fcli kommunik\u00e1ci\u00f3ban az inform\u00e1ci\u00f3 k\u00fcld\u00e9s\u00e9nek k\u00f6zege mindig megosztott. Ez nagy k\u00fcl\u00f6nbs\u00e9g a vezet\u00e9kes technol\u00f3gi\u00e1khoz k\u00e9pest. A frekvencias\u00e1v \u00e1tfed\u00e9s\u00e9nek \u00e9s interferenci\u00e1j\u00e1nak elker\u00fcl\u00e9se \u00e9rdek\u00e9ben szigor\u00fa szab\u00e1lyoknak kell lenni\u00fck a t\u00e9r haszn\u00e1lat\u00e1ra vonatkoz\u00f3an. Az egyes r\u00e9szt vev\u0151 eszk\u00f6z\u00f6k \u00e1ltal haszn\u00e1lt kommunik\u00e1ci\u00f3s protokollok felel\u0151sek a k\u00f6zeghez val\u00f3 hozz\u00e1f\u00e9r\u00e9s koordin\u00e1l\u00e1s\u00e1\u00e9rt. A vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat hat\u00e9konys\u00e1ga sz\u00e1mos t\u00e9nyez\u0151t\u0151l f\u00fcgg, bele\u00e9rtve a h\u00e1l\u00f3zatot megoszt\u00f3 sz\u00e1m\u00edt\u00f3g\u00e9pek sz\u00e1m\u00e1t, a k\u00f6rnyezeti felt\u00e9teleket, az elektrom\u00e1gneses interferenci\u00e1t, az akad\u00e1lyokat \u00e9s a k\u00e9sleltet\u00e9st. <\/p>\n\n\n\n<p>A maxim\u00e1lis adat\u00e1tviteli sebess\u00e9gek soha nem k\u00e9pviselik a maxim\u00e1lis \u201chasznos\u201d adat\u00e1tviteli sebess\u00e9get, mivel a keret egy r\u00e9sz\u00e9t a k\u00f6zeghez val\u00f3 hozz\u00e1f\u00e9r\u00e9s-vez\u00e9rl\u00e9s, az \u00e1raml\u00e1svez\u00e9rl\u00e9s, a titkos\u00edt\u00e1s stb. inform\u00e1ci\u00f3i foglalj\u00e1k el. A val\u00f3s adat\u00e1tviteli sebess\u00e9g mindig alacsonyabb, mint amit a szabv\u00e1nyok meghat\u00e1roznak. Mivel a vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zatok a leveg\u0151ben sug\u00e1roznak, a biztons\u00e1g kritikus t\u00e9nyez\u0151v\u00e9 v\u00e1lik, amely hiteles\u00edt\u00e9st \u00e9s adat titkos\u00edt\u00e1st ig\u00e9nyel az illet\u00e9ktelen hozz\u00e1f\u00e9r\u00e9s megakad\u00e1lyoz\u00e1sa \u00e9rdek\u00e9ben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-indoor-localization\">WiFi Belt\u00e9ri Helymeghat\u00e1roz\u00e1s<\/h2>\n\n\n<p>A WiFi, amely a Wireless Fidelity r\u00f6vid\u00edt\u00e9se, abb\u00f3l az ig\u00e9nyb\u0151l sz\u00fcletett, hogy l\u00e9trehozzanak egy vezet\u00e9k n\u00e9lk\u00fcli csatlakoz\u00e1si mechanizmust, amely kompatibilis a k\u00fcl\u00f6nb\u00f6z\u0151 eszk\u00f6z\u00f6k k\u00f6z\u00f6tt. M\u00e1s szavakkal, a Wi-Fi egy vezet\u00e9k n\u00e9lk\u00fcli technol\u00f3gia, amely lehet\u0151v\u00e9 teszi a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy vezet\u00e9k n\u00e9lk\u00fcl csatlakozzanak egym\u00e1shoz az Access Pointok (AP-k) vagy hotspotok n\u00e9ven ismert eszk\u00f6z\u00f6k\u00f6n kereszt\u00fcl. \u00c1ltal\u00e1ban a 2.4 GHz-es \u00e9s 5 GHz-es frekvenci\u00e1kon m\u0171k\u00f6dik, \u00e9s az Elektromos \u00e9s Elektronikai M\u00e9rn\u00f6k\u00f6k Int\u00e9zete (IEEE) szabv\u00e1nyos\u00edtotta. Az \u00e9vek sor\u00e1n sz\u00e1mos WiFi protokoll szabv\u00e1nyt fejlesztettek ki, jav\u00edtva el\u0151deik t\u00f6bb aspektus\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-wifi-technology\">A Wi-Fi Technol\u00f3gia Fejl\u0151d\u00e9se<\/h2>\n\n\n<p>Az els\u0151 hivatalos szabv\u00e1ny az 802.11b volt, amelyet az 802.11a, 802.11g, 802.11n \u00e9s 802.11ac k\u00f6vetett. A b \u00e9s g verzi\u00f3k a 2.4 GHz-es s\u00e1vban m\u0171k\u00f6dnek, \u00e9s a legsz\u00e9lesebb k\u00f6rben haszn\u00e1ltak. 2019-ben elind\u00edtott\u00e1k az 802.11ax-et (Wi-Fi 6 n\u00e9ven), amelyr\u0151l \u00fagy becs\u00fclik, hogy n\u00e9gyszeres teljes\u00edtm\u00e9nyt ny\u00fajt az 802.11ac-hez k\u00e9pest. M\u00edg az 5GHz-es h\u00e1l\u00f3zatok gyorsabb sebess\u00e9get \u00e9rnek el, mint a 2.4 GHz-esek, kev\u00e9sb\u00e9 hat\u00e9konyak az akad\u00e1lyok, p\u00e9ld\u00e1ul falak \u00e9s b\u00fatorok \u00e1thalad\u00e1s\u00e1ban, ami alacsonyabb lefedetts\u00e9gi tartom\u00e1nyt eredm\u00e9nyez. Egy \u00e1tlagos Wi-Fi h\u00e1l\u00f3zat hat\u00f3t\u00e1vols\u00e1ga 300 l\u00e1b a szabadban, vagy 150 l\u00e1b belt\u00e9rben.<\/p>\n\n\n\n<p>A Wi-Fi h\u00e1l\u00f3zatok helymeghat\u00e1roz\u00e1sra val\u00f3 haszn\u00e1lat\u00e1nak f\u0151 el\u0151nye, hogy az infrastrukt\u00fara m\u00e1r ott van az \u00e9p\u00fcletekben. A vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zatok otthoni \u00e9s \u00fczleti haszn\u00e1latra val\u00f3 gyors n\u00f6veked\u00e9se miatt gyakori, hogy egy \u00e9p\u00fcletben t\u00f6bb mint egy Wi-Fi hozz\u00e1f\u00e9r\u00e9si pont tal\u00e1lhat\u00f3. Ezek a hozz\u00e1f\u00e9r\u00e9si pontok \u00f6n\u00e1ll\u00f3an telep\u00edthet\u0151k, vagy m\u00e1s k\u00f6zeli helyekr\u0151l sz\u00e1rmazhatnak. M\u00e1sr\u00e9szt a legnagyobb probl\u00e9ma az, hogy az 802.11 protokollt nem erre a c\u00e9lra tervezt\u00e9k. Minden alkalommal, amikor meg akarjuk tudni, hol vagyunk, \u00fczeneteket kell k\u00fclden\u00fcnk az \u00f6sszes Wi-Fi hozz\u00e1f\u00e9r\u00e9si ponthoz, hogy megkapjuk a megfelel\u0151 inform\u00e1ci\u00f3kat, ami lelass\u00edtja a h\u00e1l\u00f3zatot. El\u0151fordulhat, hogy n\u00e9h\u00e1ny harmadik f\u00e9lhez tartoz\u00f3 hozz\u00e1f\u00e9r\u00e9si pont blokkolja az ilyen k\u00e9r\u00e9seket.<\/p>\n\n\n\n<p>Az IEEE 802.11 vezet\u00e9k n\u00e9lk\u00fcli szabv\u00e1nyok egy CSMA\/CA (Carrier Sense Multiple Access with Collision Avoidance) nev\u0171 k\u00f6zeg-hozz\u00e1f\u00e9r\u00e9si protokollt haszn\u00e1lnak. Neve hasonl\u00f3 a vezet\u00e9kes Ethernet h\u00e1l\u00f3zatokban haszn\u00e1lt (CSMA\/CD: Carrier Sense Multiple Access with Collision Detection) n\u00e9vhez, de m\u0171k\u00f6d\u00e9se elt\u00e9r\u0151. A vezet\u00e9k n\u00e9lk\u00fcli esetben a CA az \u00fctk\u00f6z\u00e9s elker\u00fcl\u00e9s\u00e9re utal, m\u00edg az Ethernet eset\u00e9ben az \u00fctk\u00f6z\u00e9s \u00e9szlel\u00e9s\u00e9re. A Wi-Fi h\u00e1l\u00f3zatok f\u00e9l-duplexek, ami azt jelenti, hogy az eszk\u00f6z\u00f6k nem tudnak egyszerre adni \u00e9s fogadni ugyanazon a r\u00e1di\u00f3csatorn\u00e1n. Egy eszk\u00f6z nem tud \u201challgatni\u201d ugyanabban az id\u0151ben, amikor ad, \u00edgy nem tudja \u00e9szlelni az \u00fctk\u00f6z\u00e9seket. Emiatt az IEEE szak\u00e9rt\u0151i egy \u00fctk\u00f6z\u00e9s elker\u00fcl\u00e9si mechanizmust haszn\u00e1ltak, amelyet DCF-nek (Distributed Control Function) neveztek el.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-network-security\">WiFi H\u00e1l\u00f3zati Biztons\u00e1g<\/h2>\n\n\n<p class=\"translation-block\">Mivel az \u00e1tviteli k\u00f6zeg a leveg\u0151, amely term\u00e9szetesen minden eszk\u00f6z sz\u00e1m\u00e1ra hozz\u00e1f\u00e9rhet\u0151, elengedhetetlen biztos\u00edtani, hogy a h\u00e1l\u00f3zathoz val\u00f3 hozz\u00e1f\u00e9r\u00e9s csak az enged\u00e9lyezett eszk\u00f6z\u00f6kre korl\u00e1toz\u00f3djon. Ennek el\u00e9r\u00e9s\u00e9re az 802.11i szabv\u00e1ny k\u00fcl\u00f6nb\u00f6z\u0151 rendszereket hat\u00e1roz meg, mint p\u00e9ld\u00e1ul a <strong>WEP<\/strong>, <strong>WPA<\/strong> \u00e9s <strong>WPA2<\/strong>, amelyekben az eszk\u00f6z\u00f6k kulcsokat haszn\u00e1lnak az azonos\u00edt\u00e1shoz. Az AP-k id\u0151szakosan sug\u00e1roznak egy hirdet\u00e9st, amely tartalmazza az <strong>SSID<\/strong>-t (Service Set Identifier), lehet\u0151v\u00e9 t\u00e9ve a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra a megfelel\u0151 AP azonos\u00edt\u00e1s\u00e1t \u00e9s csatlakoz\u00e1s\u00e1t. A csatlakoz\u00e1si folyamat egy hiteles\u00edt\u00e9si elj\u00e1r\u00e1ssal kezd\u0151dik, amelyhez egy kulcsot gener\u00e1lnak. A WiFi h\u00e1l\u00f3zatoknak h\u00e1romf\u00e9le hiteles\u00edt\u00e9se van.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Vezet\u00e9kes Egyen\u00e9rt\u00e9k\u0171 Adatv\u00e9delem Kulcs (WEP)<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Ennek a biztons\u00e1gi rendszernek a c\u00e9lja, hogy a vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zatokat ugyanolyan biztons\u00e1goss\u00e1 tegye, mint a vezet\u00e9keseket. Sajnos gyorsan felt\u00f6rt\u00e9k, \u00e9s haszn\u00e1lata jelenleg nem aj\u00e1nlott. A hiteles\u00edt\u00e9si folyamat kezdet\u00e9n az \u00fcgyf\u00e9l eszk\u00f6z egy titkos\u00edtatlan sz\u00f6veges \u00fczenetet k\u00fcld, amelyet az AP egy megosztott kulcs seg\u00edts\u00e9g\u00e9vel titkos\u00edt \u00e9s visszak\u00fcld az \u00fcgyf\u00e9lnek. A kulcsok \u00e1ltal\u00e1ban 128 vagy 256 bitesek. A WEP f\u0151 probl\u00e9m\u00e1ja a kulcskezel\u00e9s. \u00c1ltal\u00e1ban a kulcsokat k\u00e9zzel vagy m\u00e1s biztons\u00e1gos \u00fatvonalon osztj\u00e1k sz\u00e9t. A WEP megosztott kulcsokat haszn\u00e1l, ami azt jelenti, hogy ugyanazt a kulcsot haszn\u00e1lja minden \u00fcgyf\u00e9l sz\u00e1m\u00e1ra, \u00edgy ha a kulcsot felfedezik, minden felhaszn\u00e1l\u00f3 vesz\u00e9lyben van. A kulcs megszerz\u00e9s\u00e9hez csak hallgat\u00f3zni kell, am\u00edg meg nem kapjuk a hiteles\u00edt\u00e9si keretek visszat\u00e9r\u00e9s\u00e9t. A WEP haszn\u00e1lata jobb, mint a semmi; amikor nincs jobb, \u00e9rdemes haszn\u00e1lni. J\u00f3 aj\u00e1nl\u00e1s a fels\u0151 r\u00e9tegek biztons\u00e1g\u00e1nak haszn\u00e1lata, p\u00e9ld\u00e1ul SSL, TSL titkos\u00edt\u00e1s stb.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Wi-Fi V\u00e9dett Hozz\u00e1f\u00e9r\u00e9s (WPA)<\/strong><\/li>\n<\/ol>\n\n\n\n<p class=\"translation-block\">A WEP biztons\u00e1gi hib\u00e1inak lek\u00fczd\u00e9s\u00e9re fejlesztett\u00e9k ki a WPA-t. Ezt a rendszert a WiFi Sz\u00f6vets\u00e9g \u00e9gisze alatt tervezt\u00e9k, \u00e9s az 802.11i szabv\u00e1ny egy r\u00e9sz\u00e9t haszn\u00e1lta, amelyet k\u00e9s\u0151bb friss\u00edtettek a WEP helyettes\u00edt\u00e9s\u00e9re. A WPA egyik kulcseleme a <strong>TKIP<\/strong> (Temporal Key Integrity Protocol), amely az 802.11i szabv\u00e1ny r\u00e9sze, \u00e9s dinamikus kulcsok gener\u00e1l\u00e1s\u00e1val m\u0171k\u00f6dik. A WPA opcion\u00e1lisan haszn\u00e1lhatja az <strong>AES-CCMP<\/strong>-t (Advanced Encryption Standard \u2013 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) a TKIP helyettes\u00edt\u00e9s\u00e9re.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>WPA2\/WPAv2<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Jelenleg a legjobb el\u00e9rhet\u0151 technika a WiFi h\u00e1l\u00f3zat biztons\u00e1g\u00e1nak biztos\u00edt\u00e1s\u00e1ra. K\u00f6telez\u0151 AES-CCMP-t haszn\u00e1l, \u00e9s minden ma gy\u00e1rtott eszk\u00f6zben haszn\u00e1lj\u00e1k.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"standards\">Szabv\u00e1nyok<\/h2>\n\n\n<p>Jelenleg k\u00fcl\u00f6nb\u00f6z\u0151 vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zatokhoz f\u00e9rhet\u00fcnk hozz\u00e1, amelyek csatlakoz\u00e1st k\u00edn\u00e1lnak a mindennap haszn\u00e1lt k\u00fcl\u00f6nf\u00e9le eszk\u00f6z\u00f6kh\u00f6z. A k\u00fcl\u00f6nb\u00f6z\u0151 kommunik\u00e1ci\u00f3s szabv\u00e1nyok, amelyeket \u00e1ltal\u00e1ban \u201cWiFi\u201d n\u00e9ven ismer\u00fcnk, a k\u00f6vetkez\u0151ket tartalmazz\u00e1k:<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11a<\/strong>: egy vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat, amely a 5 GHz-es ISM s\u00e1vban m\u0171k\u00f6dik, \u00e9s adat\u00e1tviteli sebess\u00e9ge ak\u00e1r 54 Mbps is lehet.<\/p>\n\n\n\n<p>\u2022 <strong>802.11b<\/strong>: egy vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat, amely a 2.4 GHz-es ISM s\u00e1vban m\u0171k\u00f6dik, \u00e9s adat\u00e1tviteli sebess\u00e9ge ak\u00e1r 11 Mbps is lehet. <\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11g<\/strong>: egy vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat, amely a 2.4 GHz-es ISM s\u00e1vban m\u0171k\u00f6dik, \u00e9s adat\u00e1tviteli sebess\u00e9ge ak\u00e1r 54 Mbps is lehet.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11i<\/strong>: hiteles\u00edt\u00e9s \u00e9s titkos\u00edt\u00e1s.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11n<\/strong>: egy vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat, amely a 2.4 GHz-es \u00e9s 5 GHz-es ISM s\u00e1vban m\u0171k\u00f6dik, \u00e9s adat\u00e1tviteli sebess\u00e9ge ak\u00e1r 600 Mbps is lehet.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11ac<\/strong>: egy vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zat, amely 6 GHz alatti s\u00e1vban m\u0171k\u00f6dik, \u00e9s adat\u00e1tviteli sebess\u00e9ge legal\u00e1bb 1 Gbps t\u00f6bb\u00e1llom\u00e1sos m\u0171k\u00f6d\u00e9s eset\u00e9n \u00e9s 500 Mbps egyetlen kapcsolat eset\u00e9n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">A L\u00e9nyeg<\/h2>\n\n\n<p>a WiFi h\u00e1l\u00f3zat biztons\u00e1g\u00e1nak meg\u0151rz\u00e9se olyan, mint az els\u0151 ajt\u00f3 z\u00e1rva tart\u00e1sa \u2013 nem szeretn\u00e9d, ha b\u00e1rki csak \u00fagy bes\u00e9t\u00e1lna, igaz? M\u00edg a Vezet\u00e9kes Egyen\u00e9rt\u00e9k\u0171 Adatv\u00e9delem (WEP) egykor opci\u00f3 volt a h\u00e1l\u00f3zat biztons\u00e1g\u00e1nak meg\u0151rz\u00e9s\u00e9re, m\u00e1ra elavult \u00e9s ismert hib\u00e1i vannak. A Wi-Fi V\u00e9dett Hozz\u00e1f\u00e9r\u00e9s (WPA) \u00e9s ut\u00f3dja, a WPA2\/WPAv2 sokkal hat\u00e9konyabb biztons\u00e1gi int\u00e9zked\u00e9sek. A k\u00fcl\u00f6nb\u00f6z\u0151 WiFi kommunik\u00e1ci\u00f3s szabv\u00e1nyok k\u00fcl\u00f6nb\u00f6z\u0151 adat\u00e1tviteli sebess\u00e9geket \u00e9s frekvenci\u00e1kat k\u00edn\u00e1lnak, ez\u00e9rt fontos a megfelel\u0151 kiv\u00e1laszt\u00e1sa az ig\u00e9nyeidhez. Ezeknek az int\u00e9zked\u00e9seknek a megt\u00e9tel\u00e9vel biztons\u00e1gban tarthatod WiFi h\u00e1l\u00f3zatodat an\u00e9lk\u00fcl, hogy fel\u00e1ldozn\u00e1d a vezet\u00e9k n\u00e9lk\u00fcli csatlakoz\u00e1s k\u00e9nyelm\u00e9t.<\/p>","protected":false},"excerpt":{"rendered":"<p>Amit tudnia kell az otthoni vezet\u00e9k n\u00e9lk\u00fcli routerek (Wi-Fi) telep\u00edt\u00e9sekor <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A mesters\u00e9ges intelligencia, a virtu\u00e1lis val\u00f3s\u00e1g, a k\u00e9szp\u00e9nzmentes fizet\u00e9sek, a dolgok internete \u00e9s sok m\u00e1s inform\u00e1ci\u00f3technol\u00f3giai \u00e1g naponta n\u00f6vekszik. N\u00f6veked\u00e9s\u00fckkel \u00e9s terjeszked\u00e9s\u00fckkel \u00faj fenyeget\u00e9si vektorok \u00e9s sebezhet\u0151s\u00e9gek jelennek meg\u2026<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Sensing: WiFi Indoor Localization | Security Briefing<\/title>\n<meta name=\"description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Mobile Sensing: WiFi Indoor Localization\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"name\":\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"description\":\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Mobile Sensing WiFi Indoor Localization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Sensing: WiFi Indoor Localization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobil\u00e9rz\u00e9kel\u00e9s: WiFi belt\u00e9ri lokaliz\u00e1ci\u00f3 | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Tartsa biztons\u00e1gban WiFi h\u00e1l\u00f3zat\u00e1t WEP, WPA vagy WPA2 haszn\u00e1lat\u00e1val. Ismerje meg a kommunik\u00e1ci\u00f3s szabv\u00e1nyokat \u00e9s m\u00e9g sok m\u00e1st az optim\u00e1lis adat\u00e1tviteli sebess\u00e9gek \u00e9rdek\u00e9ben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/","og_locale":"hu_HU","og_type":"article","og_title":"Mobile Sensing: WiFi Indoor Localization | Security Briefing","og_description":"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.","og_url":"https:\/\/securitybriefing.net\/hu\/technologia-2\/mobil-erzekeles-wifi-belteri-lokalizacio\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T03:26:42+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"7 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Mobile Sensing: WiFi Indoor Localization","datePublished":"2023-02-25T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","articleSection":["Tech"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","url":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","name":"Mobil\u00e9rz\u00e9kel\u00e9s: WiFi belt\u00e9ri lokaliz\u00e1ci\u00f3 | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","datePublished":"2023-02-25T03:26:42+00:00","description":"Tartsa biztons\u00e1gban WiFi h\u00e1l\u00f3zat\u00e1t WEP, WPA vagy WPA2 haszn\u00e1lat\u00e1val. Ismerje meg a kommunik\u00e1ci\u00f3s szabv\u00e1nyokat \u00e9s m\u00e9g sok m\u00e1st az optim\u00e1lis adat\u00e1tviteli sebess\u00e9gek \u00e9rdek\u00e9ben.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","width":662,"height":327,"caption":"Mobile Sensing WiFi Indoor Localization"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Mobile Sensing: WiFi Indoor Localization"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}