{"id":1484,"date":"2023-02-25T03:26:42","date_gmt":"2023-02-25T03:26:42","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1484"},"modified":"2023-02-25T03:26:42","modified_gmt":"2023-02-25T03:26:42","slug":"mobil-sensor-wifi-inomhus-lokalisering","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/","title":{"rendered":"Mobil avk\u00e4nning: Lokalisering av WiFi inomhus"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"introduction\">Introduktion<\/h2>\n\n\n<p>Under de senaste \u00e5ren har fr\u00e5gan om plats blivit allt viktigare. Tj\u00e4nster som Google Maps har gjort det enkelt att navigera och lokalisera specifika punkter \u00f6ver hela v\u00e4rlden med hj\u00e4lp av satelliter. Eftersom dessa system redan fungerar korrekt utomhus \u00e4r n\u00e4sta steg att till\u00e4mpa liknande teknik inomhus, till exempel i museer eller k\u00f6pcentrum. Analoga system kan guida m\u00e4nniskor till intressanta platser, som ett konstverk p\u00e5 ett museum, eller erbjuda inneh\u00e5ll baserat p\u00e5 plats, som reklam n\u00e4r man passerar en butik i ett k\u00f6pcentrum. Men i slutna milj\u00f6er \u00e4r satellitprecisionen l\u00e5g, vilket g\u00f6r det n\u00f6dv\u00e4ndigt att tillgripa andra teknologier f\u00f6r effektiv positionering.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"indoor-location-technology\">Inomhuslokaliseringsteknik<\/h2>\n\n\n<p>Inomhusbaserade platsbaserade tj\u00e4nster har v\u00e4ckt stor uppm\u00e4rksamhet p\u00e5 grund av deras sociala och monet\u00e4ra betydelse, med en ber\u00e4knad marknadsv\u00e4rde p\u00e5 10 miljarder dollar fram till 2020. P\u00e5 grund av GPS:s ineffektivitet i inomhusmilj\u00f6er kr\u00e4vs alternativa teknologier som WiFi eller Bluetooth. Beacons skickar alltid ut en signal som kan tas emot av andra BLE-kompatibla enheter. De \u00e4r bra f\u00f6r positioneringssystem eftersom de \u00e4r billiga, anv\u00e4nder mindre energi och \u00e4r enkla att installera. Befintliga till\u00e4mpningar av olika inomhussp\u00e5rningsalgoritmer som anv\u00e4nder tr\u00e5dl\u00f6sa teknologier \u00e4r dock ofta oprecisa. Algoritmer baserade p\u00e5 RSSI-m\u00e4tningar i WiFi-n\u00e4tverk \u00e4r vanligtvis oprecisa p\u00e5 grund av den stora variationen i signalen som m\u00e4ts vid varje tillf\u00e4lle. \u00c4ven om m\u00e5nga aspekter av WiFi f\u00f6rb\u00e4ttras har precisionen fortfarande en l\u00e5ng v\u00e4g att g\u00e5.&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wireless-communications\">Tr\u00e5dl\u00f6s kommunikation<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Wireless-Communications-banner-1-1-2.jpg\" alt=\"Tr\u00e5dl\u00f6s kommunikation\" class=\"wp-image-1502\"\/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Inom tr\u00e5dl\u00f6s kommunikation \u00e4r mediet f\u00f6r att skicka information alltid delat. Detta \u00e4r en stor skillnad fr\u00e5n kabelbaserade teknologier. F\u00f6r att undvika \u00f6verlappning av frekvensband och st\u00f6rningar m\u00e5ste det finnas strikta regler f\u00f6r hur utrymmet anv\u00e4nds. Kommunikationsprotokollen som anv\u00e4nds av varje deltagande enhet \u00e4r ansvariga f\u00f6r att koordinera \u00e5tkomsten till mediet. Effektiviteten hos ett tr\u00e5dl\u00f6st n\u00e4tverk beror p\u00e5 flera faktorer, inklusive antalet datorer som delar n\u00e4tverket, milj\u00f6f\u00f6rh\u00e5llanden, elektromagnetiska st\u00f6rningar, hinder och latens. <\/p>\n\n\n\n<p>Maximala data\u00f6verf\u00f6ringshastigheter representerar aldrig den maximala \"anv\u00e4ndbara\" data\u00f6verf\u00f6ringshastigheten eftersom en del av ramen \u00e4r upptagen av information om \u00e5tkomstkontroll till mediet, fl\u00f6deskontroll, kryptering etc. Den verkliga data\u00f6verf\u00f6ringshastigheten ligger alltid under vad som definieras i standarderna. Eftersom tr\u00e5dl\u00f6sa n\u00e4tverk s\u00e4nds \u00f6ver luften blir s\u00e4kerhet en kritisk faktor, vilket kr\u00e4ver autentisering och datakryptering f\u00f6r att f\u00f6rhindra obeh\u00f6rig \u00e5tkomst.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-indoor-localization\">WiFi inomhuslokalisering<\/h2>\n\n\n<p>WiFi, som st\u00e5r f\u00f6r Wireless Fidelity, f\u00f6ddes ur behovet av att etablera en tr\u00e5dl\u00f6s anslutningsmekanism som var kompatibel mellan olika enheter. Med andra ord \u00e4r Wi-Fi en tr\u00e5dl\u00f6s teknik som g\u00f6r det m\u00f6jligt f\u00f6r anv\u00e4ndare att ansluta tr\u00e5dl\u00f6st till varandra genom enheter som kallas Access Points (AP) eller hotspots. Det fungerar vanligtvis p\u00e5 2,4 GHz och 5 GHz frekvenser och standardiserades av Institute of Electrical and Electronics Engineers (IEEE). Under \u00e5ren har m\u00e5nga WiFi-protokollstandarder utvecklats, vilka har f\u00f6rb\u00e4ttrat flera aspekter av sina f\u00f6reg\u00e5ngare.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-wifi-technology\">Utvecklingen av Wi-Fi-teknologi<\/h2>\n\n\n<p>Den f\u00f6rsta officiella standarden var 802.11b, f\u00f6ljd av 802.11a, 802.11g, 802.11n och 802.11ac. b- och g-versionerna fungerar i 2,4 GHz-bandet och \u00e4r de mest anv\u00e4nda. \u00c5r 2019 lanserades 802.11ax (kallad Wi-Fi 6), som ber\u00e4knas ha fyra g\u00e5nger prestandan av 802.11ac. Medan 5 GHz-n\u00e4tverk uppn\u00e5r snabbare hastigheter \u00e4n 2,4 GHz, \u00e4r de mindre effektiva p\u00e5 att passera hinder som v\u00e4ggar och m\u00f6bler, vilket resulterar i ett l\u00e4gre t\u00e4ckningsomr\u00e5de. Ett genomsnittligt Wi-Fi-n\u00e4tverk har en r\u00e4ckvidd p\u00e5 300 fot utomhus eller 150 fot inomhus.<\/p>\n\n\n\n<p>Den st\u00f6rsta f\u00f6rdelen med att anv\u00e4nda Wi-Fi-n\u00e4tverk f\u00f6r positionering \u00e4r att infrastrukturen redan finns i byggnader. P\u00e5 grund av den snabba tillv\u00e4xten av tr\u00e5dl\u00f6sa n\u00e4tverk f\u00f6r hem- och f\u00f6retagsanv\u00e4ndning \u00e4r det vanligt att hitta mer \u00e4n en Wi-Fi-\u00e5tkomstpunkt i en byggnad. Dessa \u00e5tkomstpunkter kan installeras sj\u00e4lvst\u00e4ndigt eller komma fr\u00e5n andra platser i n\u00e4rheten. \u00c5 andra sidan \u00e4r det st\u00f6rsta problemet att 802.11-protokollet inte skapades f\u00f6r att anv\u00e4ndas p\u00e5 detta s\u00e4tt. Varje g\u00e5ng du vill ta reda p\u00e5 var du \u00e4r m\u00e5ste du skicka meddelanden till alla Wi-Fi-\u00e5tkomstpunkter f\u00f6r att beg\u00e4ra r\u00e4tt information, vilket saktar ner n\u00e4tverket. I sin tur kan det h\u00e4nda att vissa \u00e5tkomstpunkter som tillh\u00f6r en tredje part blockerar s\u00e5dana f\u00f6rfr\u00e5gningar.<\/p>\n\n\n\n<p>IEEE 802.11 tr\u00e5dl\u00f6sa standarder anv\u00e4nder en medium\u00e5tkomstprotokoll som kallas CSMA\/CA (Carrier Sense Multiple Access with Collision Avoidance). Dess namn liknar det som anv\u00e4nds i kabelbundna Ethernet-n\u00e4tverk (CSMA\/CD: Carrier Sense Multiple Access with Collision Detection), men dess funktion \u00e4r annorlunda. I det tr\u00e5dl\u00f6sa fallet h\u00e4nvisar CA till kollisionsundvikande, medan det i Ethernet handlar om kollisionsdetektering. Wi-Fi-n\u00e4tverk \u00e4r halvduplex, vilket inneb\u00e4r att enheter inte kan s\u00e4nda och ta emot samtidigt p\u00e5 samma radiokanal. En enhet kan inte \"lyssna\" samtidigt som den s\u00e4nder, och kan d\u00e4rf\u00f6r inte uppt\u00e4cka kollisioner. P\u00e5 grund av detta anv\u00e4nde IEEE-experter en kollisionsundvikande mekanism som de kallade DCF (Distributed Control Function).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"wifi-network-security\">WiFi-n\u00e4tverkss\u00e4kerhet<\/h2>\n\n\n<p class=\"translation-block\">Eftersom \u00f6verf\u00f6ringsmediet \u00e4r luften, som naturligt \u00e4r tillg\u00e4nglig f\u00f6r alla enheter, \u00e4r det viktigt att s\u00e4kerst\u00e4lla att \u00e5tkomsten till n\u00e4tverket \u00e4r begr\u00e4nsad till auktoriserade enheter. F\u00f6r att uppn\u00e5 detta definierar 802.11i-standarden olika system, s\u00e5som <strong>WEP<\/strong>, <strong>WPA<\/strong> och <strong>WPA2<\/strong>, d\u00e4r enheter anv\u00e4nder nycklar f\u00f6r autentisering. Access Points s\u00e4nder regelbundet en annons som inneh\u00e5ller <strong>SSID<\/strong> (Service Set Identifier), vilket g\u00f6r det m\u00f6jligt f\u00f6r anv\u00e4ndare att identifiera r\u00e4tt AP och ansluta till det. Anslutningsprocessen b\u00f6rjar med en autentiseringsprocedur, f\u00f6r vilken en nyckel genereras. WiFi-n\u00e4tverk har tre typer av autentisering.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Tr\u00e5dbunden Sekretessnyckel (WEP)<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>M\u00e5let med detta s\u00e4kerhetssystem \u00e4r att g\u00f6ra tr\u00e5dl\u00f6sa n\u00e4tverk lika s\u00e4kra som tr\u00e5dbundna. Tyv\u00e4rr komprometterades det snabbt, och dess anv\u00e4ndning rekommenderas inte f\u00f6r n\u00e4rvarande. I b\u00f6rjan av autentiseringsprocessen skickar klientenheten ett okrypterat textmeddelande, som AP krypterar med en delad nyckel och returnerar till klienten. Nycklarna \u00e4r vanligtvis 128 eller 256 bitar. Huvudproblemet med WEP \u00e4r nyckelhantering. Generellt distribueras nycklar manuellt eller via en annan s\u00e4ker v\u00e4g. WEP anv\u00e4nder delade nycklar, vilket inneb\u00e4r att den anv\u00e4nder samma nyckel f\u00f6r alla klienter, s\u00e5 om nyckeln uppt\u00e4cks \u00e4r alla anv\u00e4ndare i riskzonen. F\u00f6r att f\u00e5 nyckeln \u00e4r det bara n\u00f6dv\u00e4ndigt att lyssna tills man f\u00e5r \u00e5terkomsten av autentiseringsramarna. Att anv\u00e4nda WEP \u00e4r b\u00e4ttre \u00e4n ingenting; n\u00e4r det inte finns n\u00e5got b\u00e4ttre \u00e4r det l\u00e4mpligt att anv\u00e4nda det. En bra rekommendation \u00e4r att anv\u00e4nda s\u00e4kerhet i de \u00f6vre lagren, s\u00e5som SSL, TSL-kryptering, etc.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Wi-Fi Skyddad \u00c5tkomst (WPA)<\/strong><\/li>\n<\/ol>\n\n\n\n<p class=\"translation-block\">F\u00f6r att \u00f6vervinna s\u00e4kerhetsbristerna i WEP utvecklades WPA. Detta system utformades under WiFi Alliance:s beskydd och anv\u00e4nde en del av 802.11i-standarden, som senare uppdaterades f\u00f6r att ers\u00e4tta WEP. En av nyckelelementen i WPA \u00e4r <strong>TKIP<\/strong> (Temporal Key Integrity Protocol), som \u00e4r en del av 802.11i-standarden och fungerar genom att generera dynamiska nycklar. WPA kan eventuellt anv\u00e4nda <strong>AES-CCMP<\/strong> (Advanced Encryption Standard \u2013 Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) som ett alternativ till TKIP.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>WPA2\/WPAv2<\/strong>:<\/li>\n<\/ol>\n\n\n\n<p>Det \u00e4r f\u00f6r n\u00e4rvarande den b\u00e4sta tillg\u00e4ngliga tekniken f\u00f6r att s\u00e4kra ett WiFi-n\u00e4tverk. Den anv\u00e4nder obligatorisk AES-CCMP och anv\u00e4nds i alla enheter som tillverkas idag.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"standards\">Standarder<\/h2>\n\n\n<p>Vi har f\u00f6r n\u00e4rvarande tillg\u00e5ng till olika tr\u00e5dl\u00f6sa n\u00e4tverk som ger oss anslutning till de flera enheter vi anv\u00e4nder dagligen. Olika kommunikationsstandarder som vanligtvis anv\u00e4nds g\u00e5r under namnet \u201eWiFi\u201c, inklusive:<\/p>\n\n\n\n<p class=\"translation-block\"><strong>802.11a<\/strong>: ett tr\u00e5dl\u00f6st n\u00e4tverk med en b\u00e4rare i 5 GHz ISM-bandet och en data\u00f6verf\u00f6ringshastighet p\u00e5 upp till 54 Mbps.<\/p>\n\n\n\n<p>\u2022 <strong>802.11b<\/strong>: ett tr\u00e5dl\u00f6st n\u00e4tverk med en b\u00e4rare i 2,4 GHz ISM-bandet och en data\u00f6verf\u00f6ringshastighet p\u00e5 upp till 11 Mbps. <\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11g<\/strong>: ett tr\u00e5dl\u00f6st n\u00e4tverk med en b\u00e4rare i 2,4 GHz ISM-bandet och en data\u00f6verf\u00f6ringshastighet p\u00e5 upp till 54 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11i<\/strong>: autentisering och kryptering.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11n<\/strong>: ett tr\u00e5dl\u00f6st n\u00e4tverk med en b\u00e4rare i 2,4 GHz och 5 GHz ISM-bandet, med data\u00f6verf\u00f6ringshastigheter p\u00e5 upp till 600 Mbps.<\/p>\n\n\n\n<p class=\"translation-block\">\u2022 <strong>802.11ac<\/strong>: ett tr\u00e5dl\u00f6st n\u00e4tverk med en b\u00e4rv\u00e5g under 6 GHz, med data\u00f6verf\u00f6ringshastigheter p\u00e5 minst 1 Gbps i multi-stationsdrift och 500 Mbps i en enskild l\u00e4nk.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">Slutsatsen<\/h2>\n\n\n<p>Att h\u00e5lla ditt WiFi-n\u00e4tverk s\u00e4kert \u00e4r som att h\u00e5lla din ytterd\u00f6rr l\u00e5st\u2014du vill inte att vem som helst bara kliver in, eller hur? \u00c4ven om Wired-Equivalent Privacy (WEP) en g\u00e5ng var ett alternativ f\u00f6r att s\u00e4kra ditt n\u00e4tverk, \u00e4r det nu f\u00f6r\u00e5ldrat och har k\u00e4nda brister. Wi-Fi Protected Access (WPA) och dess efterf\u00f6ljare, WPA2\/WPAv2, \u00e4r mycket mer effektiva s\u00e4kerhets\u00e5tg\u00e4rder. Olika WiFi-kommunikationsstandarder erbjuder olika data\u00f6verf\u00f6ringshastigheter och frekvenser, s\u00e5 det \u00e4r viktigt att v\u00e4lja r\u00e4tt f\u00f6r dina behov. Genom att vidta dessa \u00e5tg\u00e4rder kan du h\u00e5lla ditt WiFi-n\u00e4tverk s\u00e4kert utan att kompromissa med bekv\u00e4mligheten av tr\u00e5dl\u00f6s anslutning.<\/p>","protected":false},"excerpt":{"rendered":"<p>Inledning Under de senaste \u00e5ren har fr\u00e5gan om var man befinner sig blivit allt viktigare. Tj\u00e4nster som Google Maps har gjort det enkelt att navigera och lokalisera specifika punkter var som helst i v\u00e4rlden.... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/\">Continue reading <span class=\"screen-reader-text\">Mobil avk\u00e4nning: Lokalisering av WiFi inomhus<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Sensing: WiFi Indoor Localization | Security Briefing<\/title>\n<meta name=\"description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Mobile Sensing: WiFi Indoor Localization\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"},\"wordCount\":1431,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\",\"name\":\"Mobile Sensing: WiFi Indoor Localization | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"datePublished\":\"2023-02-25T03:26:42+00:00\",\"description\":\"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Mobile Sensing WiFi Indoor Localization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Sensing: WiFi Indoor Localization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobil avk\u00e4nning: WiFi inomhuslokalisering | S\u00e4kerhetsbriefing","description":"H\u00e5ll ditt WiFi-n\u00e4tverk s\u00e4kert med WEP, WPA eller WPA2. L\u00e4r dig om kommunikationsstandarder och mer f\u00f6r optimala data\u00f6verf\u00f6ringshastigheter.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/","og_locale":"sv_SE","og_type":"article","og_title":"Mobile Sensing: WiFi Indoor Localization | Security Briefing","og_description":"Keep your WiFi network secure with WEP, WPA, or WPA2. Learn about communication standards and more for optimal data transfer rates.","og_url":"https:\/\/securitybriefing.net\/sv\/teknik\/mobil-sensor-wifi-inomhus-lokalisering\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T03:26:42+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"7 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Mobile Sensing: WiFi Indoor Localization","datePublished":"2023-02-25T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"},"wordCount":1431,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","articleSection":["Tech"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","url":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/","name":"Mobil avk\u00e4nning: WiFi inomhuslokalisering | S\u00e4kerhetsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","datePublished":"2023-02-25T03:26:42+00:00","description":"H\u00e5ll ditt WiFi-n\u00e4tverk s\u00e4kert med WEP, WPA eller WPA2. L\u00e4r dig om kommunikationsstandarder och mer f\u00f6r optimala data\u00f6verf\u00f6ringshastigheter.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Mobile-Sensing-WiFi-Indoor-Localization-1.jpg","width":662,"height":327,"caption":"Mobile Sensing WiFi Indoor Localization"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/mobile-sensing-wifi-indoor-localization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Mobile Sensing: WiFi Indoor Localization"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}