{"id":1484,"date":"2023-02-25T03:26:42","date_gmt":"2023-02-25T03:26:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1484"},"modified":"2023-02-25T03:26:42","modified_gmt":"2023-02-25T03:26:42","slug":"detectare-mobila-wifi-localizare-interioara","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/","title":{"rendered":"Detec\u021bie mobil\u0103: Localizare WiFi \u00een interior"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"introduction\">Introducere<\/h2>\n\n\n<p>\u00cen ultimii ani, problema loca\u021biei a devenit din ce \u00een ce mai important\u0103. Serviciile precum Google Maps au f\u0103cut u\u0219oar\u0103 navigarea \u0219i localizarea punctelor specifice oriunde \u00een lume folosind sateli\u021bi. Deoarece aceste sisteme func\u021bioneaz\u0103 deja precis \u00een exterior, urm\u0103torul pas este aplicarea unei tehnologii similare \u00een interiorul cl\u0103dirilor, cum ar fi muzee sau centre comerciale. Sistemele analoge pot ghida oamenii c\u0103tre locuri de interes, cum ar fi o oper\u0103 de art\u0103 \u00eentr-un muzeu, sau oferi con\u021binut bazat pe loca\u021bie, cum ar fi reclame atunci c\u00e2nd treci pe l\u00e2ng\u0103 un magazin \u00eentr-un centru comercial. Cu toate acestea, \u00een medii \u00eenchise, precizia sateli\u021bilor este sc\u0103zut\u0103, ceea ce face necesar\u0103 recurgerea la alte tehnologii pentru o pozi\u021bionare eficient\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"indoor-location-technology\">Tehnologie de Localizare \u00een Interior<\/h2>\n\n\n<p>Serviciile bazate pe loca\u021bie interioar\u0103 au generat un mare interes datorit\u0103 semnifica\u021biei lor sociale \u0219i monetare, cu o valoare de pia\u021b\u0103 proiectat\u0103 de 10 miliarde de dolari p\u00e2n\u0103 \u00een 2020. Datorit\u0103 ineficien\u021bei GPS \u00een mediile interioare, sunt necesare tehnologii alternative precum WiFi sau Bluetooth. Beacoanele trimit \u00eentotdeauna un semnal care poate fi recep\u021bionat de alte dispozitive compatibile cu BLE. Acestea sunt bune pentru sistemele de pozi\u021bionare deoarece sunt ieftine, consum\u0103 mai pu\u021bin\u0103 energie \u0219i sunt u\u0219or de configurat. Cu toate acestea, aplica\u021biile existente ale diferitelor algoritmi de urm\u0103rire interioar\u0103 folosind tehnologii wireless sunt adesea imprecise. Algoritmii bazati pe m\u0103sur\u0103tori RSSI \u00een re\u021belele WiFi sunt de obicei impreci\u0219i din cauza varia\u021biei mari a semnalului m\u0103surat \u00een fiecare moment. De\u0219i multe aspecte ale WiFi se \u00eembun\u0103t\u0103\u021besc, precizia mai are un drum lung de parcurs.&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wireless-communications\">Comunica\u021bii wireless<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Wireless-Communications-banner-1-1-2.jpg\" alt=\"Comunica\u021bii wireless\" class=\"wp-image-1502\"\/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u00cen comunica\u021biile wireless, mediul pentru trimiterea informa\u021biilor este \u00eentotdeauna \u00eemp\u0103rt\u0103\u0219it. Aceasta este o mare diferen\u021b\u0103 fa\u021b\u0103 de tehnologiile cablate. Pentru a evita suprapunerea benzilor de frecven\u021b\u0103 \u0219i interferen\u021bele, trebuie s\u0103 existe reguli stricte despre modul \u00een care este utilizat spa\u021biul. Protocoalele de comunicare folosite de fiecare dispozitiv participant sunt responsabile pentru coordonarea accesului la mediu. Eficacitatea unei re\u021bele wireless depinde de mai mul\u021bi factori, inclusiv num\u0103rul de calculatoare care \u00eempart re\u021beaua, condi\u021biile de mediu, interferen\u021bele electromagnetice, obstacolele \u0219i laten\u021ba. <\/p>\n\n\n\n<p>Ratele maxime de transmisie a datelor nu reprezint\u0103 niciodat\u0103 rata maxim\u0103 de transmisie a datelor \u201eutile\u201d, deoarece o parte a cadrului este ocupat\u0103 de informa\u021bii despre controlul accesului la mediu, controlul fluxului, criptare etc. Rata real\u0103 de transfer de date este \u00eentotdeauna sub ceea ce este definit \u00een standarde. Deoarece re\u021belele wireless sunt difuzate prin aer, securitatea devine un factor critic, necesit\u00e2nd autentificare \u0219i criptare a datelor pentru a preveni accesul neautorizat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-indoor-localization\">Localizare WiFi \u00een interior<\/h2>\n\n\n<p>WiFi, care vine de la Wireless Fidelity, s-a n\u0103scut din necesitatea de a stabili un mecanism de conexiune f\u0103r\u0103 fir care s\u0103 fie compatibil \u00eentre diferite dispozitive. Cu alte cuvinte, Wi-Fi este o tehnologie f\u0103r\u0103 fir care permite utilizatorilor s\u0103 se conecteze f\u0103r\u0103 fir \u00eentre ei prin intermediul dispozitivelor cunoscute sub numele de Access Points (AP) sau hotspot-uri. Acesta func\u021bioneaz\u0103 \u00een general pe frecven\u021bele de 2,4 GHz \u0219i 5 GHz \u0219i a fost standardizat de c\u0103tre Institute of Electrical and Electronics Engineers (IEEE). De-a lungul anilor, au fost dezvoltate numeroase standarde de protocol WiFi, \u00eembun\u0103t\u0103\u021bind mai multe aspecte ale predecesorilor s\u0103i.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-wifi-technology\">Evolu\u021bia tehnologiei Wi-Fi<\/h2>\n\n\n<p>Primul standard oficial a fost 802.11b, urmat de 802.11a, 802.11g, 802.11n \u0219i 802.11ac. Versiunile b \u0219i g func\u021bioneaz\u0103 \u00een banda de 2,4 GHz \u0219i sunt cele mai utilizate. \u00cen 2019, 802.11ax (numit Wi-Fi 6) a fost lansat, care se estimeaz\u0103 c\u0103 are de patru ori performan\u021ba lui 802.11ac. \u00cen timp ce re\u021belele de 5 GHz ating viteze mai mari dec\u00e2t 2,4 GHz, ele sunt mai pu\u021bin eficiente \u00een traversarea obstacolelor cum ar fi pere\u021bii \u0219i mobilele, rezult\u00e2nd \u00eentr-un interval de acoperire mai mic. O re\u021bea Wi-Fi medie are o raz\u0103 de ac\u021biune de 300 de metri \u00een aer liber sau 150 de metri \u00een interior.<\/p>\n\n\n\n<p>Principalul beneficiu al utiliz\u0103rii re\u021belelor Wi-Fi pentru pozi\u021bionare este c\u0103 infrastructura este deja prezent\u0103 \u00een cl\u0103diri. Datorit\u0103 cre\u0219terii rapide a re\u021belelor wireless pentru uz casnic \u0219i de afaceri, este comun s\u0103 g\u0103se\u0219ti mai mult de un punct de acces Wi-Fi \u00eentr-o cl\u0103dire. Aceste puncte de acces pot fi instalate independent sau pot proveni de la alte locuri din apropiere. Pe de alt\u0103 parte, cea mai mare problem\u0103 este c\u0103 protocolul 802.11 nu a fost creat pentru a fi utilizat \u00een acest fel. De fiecare dat\u0103 c\u00e2nd dori\u021bi s\u0103 v\u0103 afla\u021bi loca\u021bia, trebuie s\u0103 trimite\u021bi mesaje c\u0103tre toate punctele de acces Wi-Fi pentru a solicita informa\u021biile corecte, ceea ce \u00eencetine\u0219te re\u021beaua. La r\u00e2ndul s\u0103u, se poate \u00eent\u00e2mpla ca unele puncte de acces care apar\u021bin unei ter\u021be p\u0103r\u021bi s\u0103 blocheze astfel de solicit\u0103ri.<\/p>\n\n\n\n<p>Standardele wireless IEEE 802.11 folosesc un protocol de acces la mediu numit CSMA\/CA (Carrier Sense Multiple Access with Collision Avoidance). Numele s\u0103u este similar cu cel utilizat \u00een re\u021belele Ethernet cablate (CSMA\/CD: Carrier Sense Multiple Access with Collision Detection), dar func\u021bionarea sa este diferit\u0103. \u00cen cazul wireless, CA se refer\u0103 la evitarea coliziunilor, \u00een timp ce \u00een Ethernet este vorba despre detectarea coliziunilor. Re\u021belele Wi-Fi sunt half-duplex, ceea ce \u00eenseamn\u0103 c\u0103 dispozitivele nu pot transmite \u0219i primi \u00een acela\u0219i timp pe acela\u0219i canal radio. Un dispozitiv nu poate \u201easculta\u201d \u00een acela\u0219i timp \u00een care transmite, astfel \u00eenc\u00e2t nu poate detecta coliziuni. Din aceast\u0103 cauz\u0103, exper\u021bii IEEE au folosit un mecanism de evitare a coliziunilor pe care l-au numit DCF (Distributed Control Function).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-network-security\">Securitatea re\u021belei WiFi<\/h2>\n\n\n<p class=\"translation-block\">Deoarece mediul de transmisie este aerul, care este \u00een mod natural accesibil pentru orice dispozitiv, este esen\u021bial s\u0103 se asigure c\u0103 accesul la re\u021bea este restric\u021bionat la dispozitivele autorizate. Pentru a realiza acest lucru, standardul 802.11i define\u0219te diferite sisteme, cum ar fi <strong>WEP<\/strong>, <strong>WPA<\/strong> \u0219i <strong>WPA2<\/strong>, \u00een care dispozitivele folosesc chei pentru autentificare. Punctele de acces transmit periodic un anun\u021b care con\u021bine <strong>SSID<\/strong> (Service Set Identifier), permi\u021b\u00e2nd utilizatorilor s\u0103 identifice punctul de acces corect \u0219i s\u0103 se conecteze la acesta. Procesul de conectare \u00eencepe cu o procedur\u0103 de autentificare, pentru care este generat\u0103 o cheie. Re\u021belele WiFi au trei tipuri de autentificare.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cheie de Confiden\u021bialitate Echivalent\u0103 Cablului (WEP)<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Scopul acestui sistem de securitate este de a face re\u021belele wireless la fel de sigure ca cele cablate. Din p\u0103cate, a fost compromis rapid \u0219i utilizarea sa nu este recomandat\u0103 \u00een prezent. La \u00eenceputul procesului de autentificare, dispozitivul client trimite un mesaj text necriptat, pe care AP-ul \u00eel cripteaz\u0103 folosind o cheie partajat\u0103 \u0219i \u00eel returneaz\u0103 clientului. Cheile sunt de obicei de 128 sau 256 bi\u021bi. Problema principal\u0103 cu WEP este gestionarea cheilor. \u00cen general, cheile sunt distribuite manual sau printr-o alt\u0103 rut\u0103 sigur\u0103. WEP folose\u0219te chei partajate, ceea ce \u00eenseamn\u0103 c\u0103 folose\u0219te aceea\u0219i cheie pentru to\u021bi clien\u021bii, astfel \u00eenc\u00e2t dac\u0103 cheia este descoperit\u0103, to\u021bi utilizatorii sunt \u00een pericol. Pentru a ob\u021bine cheia, este necesar doar s\u0103 ascul\u021bi p\u00e2n\u0103 la ob\u021binerea return\u0103rii cadrelor de autentificare. Utilizarea WEP este mai bun\u0103 dec\u00e2t nimic; c\u00e2nd nu exist\u0103 nimic mai bun, este recomandabil s\u0103 o folose\u0219ti. O recomandare bun\u0103 este s\u0103 folose\u0219ti securitate \u00een straturile superioare, cum ar fi criptarea SSL, TSL etc.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Acces Protejat Wi-Fi (WPA)<\/strong><\/li>\n<\/ol>\n\n\n\n<p class=\"translation-block\">Pentru a dep\u0103\u0219i vulnerabilit\u0103\u021bile de securitate ale WEP, a fost dezvoltat WPA. Acest sistem a fost proiectat sub egida WiFi Alliance \u0219i a folosit o parte a standardului 802.11i, care a fost ulterior actualizat pentru a \u00eenlocui WEP. Unul dintre elementele cheie ale WPA este <strong>TKIP<\/strong> (Temporal Key Integrity Protocol), care face parte din standardul 802.11i \u0219i func\u021bioneaz\u0103 prin generarea de chei dinamice. WPA poate folosi op\u021bional <strong>AES-CCMP<\/strong> (Advanced Encryption Standard \u2013 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) ca \u00eenlocuitor pentru TKIP.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>WPA2\/WPAv2<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Este \u00een prezent cea mai bun\u0103 tehnic\u0103 disponibil\u0103 pentru a securiza o re\u021bea WiFi. Utilizeaz\u0103 AES-CCMP obligatoriu \u0219i este folosit\u0103 \u00een toate dispozitivele fabricate ast\u0103zi.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"standards\">Standarde<\/h2>\n\n\n<p>Avem \u00een prezent acces la diverse re\u021bele wireless care ne ofer\u0103 conectivitate la multiplele dispozitive pe care le utiliz\u0103m zilnic. Diferite standarde de comunicare folosite \u00een mod obi\u0219nuit se reg\u0103sesc sub denumirea \u201eWiFi\u201d, inclusiv:<\/p>\n\n\n\n<p class=\"translation-block\"><strong>802.11a<\/strong>: o re\u021bea wireless cu un purt\u0103tor \u00een banda ISM de 5 GHz \u0219i o vitez\u0103 de transfer de date de p\u00e2n\u0103 la 54 Mbps.<\/p>\n\n\n\n<p>- <strong>802.11b<\/strong>: o re\u021bea wireless cu un purt\u0103tor \u00een banda ISM de 2,4 GHz \u0219i o rat\u0103 de transfer de date de p\u00e2n\u0103 la 11 Mbps. <\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11g<\/strong>: o re\u021bea wireless cu un purt\u0103tor \u00een banda ISM de 2,4 GHz \u0219i o rat\u0103 de transfer de date de p\u00e2n\u0103 la 54 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11i<\/strong>: autentificare \u0219i criptare.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11n<\/strong>: o re\u021bea wireless cu un purt\u0103tor \u00een banda ISM de 2,4 GHz \u0219i 5 GHz, cu viteze de transfer de date de p\u00e2n\u0103 la 600 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11ac<\/strong>: o re\u021bea wireless cu un purt\u0103tor sub 6 GHz, cu rate de transfer de date de cel pu\u021bin 1 Gbps \u00een opera\u021biune multi-sta\u021bie \u0219i 500 Mbps \u00eentr-o singur\u0103 leg\u0103tur\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">Concluzia<\/h2>\n\n\n<p>Men\u021binerea securit\u0103\u021bii re\u021belei tale WiFi este ca \u0219i cum ai \u021bine u\u0219a de la intrare \u00eencuiat\u0103\u2014nu ai vrea ca oricine s\u0103 intre, nu-i a\u0219a? De\u0219i Wired-Equivalent Privacy (WEP) a fost odat\u0103 o op\u021biune pentru securizarea re\u021belei tale, acum este dep\u0103\u0219it\u0103 \u0219i are vulnerabilit\u0103\u021bi cunoscute. Wi-Fi Protected Access (WPA) \u0219i succesorul s\u0103u, WPA2\/WPAv2, sunt m\u0103suri de securitate mult mai eficiente. Diferitele standarde de comunica\u021bii WiFi ofer\u0103 diverse viteze de transfer de date \u0219i frecven\u021be, a\u0219a c\u0103 este important s\u0103 alegi standardul potrivit pentru nevoile tale. Lu\u00e2nd aceste m\u0103suri, po\u021bi men\u021bine re\u021beaua WiFi \u00een siguran\u021b\u0103 f\u0103r\u0103 a sacrifica comoditatea conectivit\u0103\u021bii wireless.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introducere \u00cen ultimii ani, problema loca\u021biei a devenit din ce \u00een ce mai important\u0103. Servicii precum Google Maps au facilitat navigarea \u0219i localizarea punctelor specifice oriunde \u00een... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/\">Continue reading <span class=\"screen-reader-text\">Detec\u021bie mobil\u0103: Localizare WiFi \u00een interior<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Sensing: WiFi Indoor Localization | Security Briefing<\/title>\n<meta name=\"description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Mobile Sensing: WiFi Indoor Localization\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"name\":\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"description\":\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Mobile Sensing WiFi Indoor Localization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Sensing: WiFi Indoor Localization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Senzori mobili: Localizare \u00een interior prin WiFi | Informare de securitate","description":"Men\u021bine-\u021bi re\u021beaua WiFi securizat\u0103 cu WEP, WPA sau WPA2. Afl\u0103 despre standardele de comunica\u021bie \u0219i altele pentru rate optime de transfer de date.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/","og_locale":"ro_RO","og_type":"article","og_title":"Mobile Sensing: WiFi Indoor Localization | Security Briefing","og_description":"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.","og_url":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/detectare-mobila-wifi-localizare-interioara\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T03:26:42+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"7 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Mobile Sensing: WiFi Indoor Localization","datePublished":"2023-02-25T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","articleSection":["Tech"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","url":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","name":"Senzori mobili: Localizare \u00een interior prin WiFi | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","datePublished":"2023-02-25T03:26:42+00:00","description":"Men\u021bine-\u021bi re\u021beaua WiFi securizat\u0103 cu WEP, WPA sau WPA2. Afl\u0103 despre standardele de comunica\u021bie \u0219i altele pentru rate optime de transfer de date.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","width":662,"height":327,"caption":"Mobile Sensing WiFi Indoor Localization"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Mobile Sensing: WiFi Indoor Localization"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}