O'Reilly logo

RTLS For Dummies® by Ajay Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15

RTLS Vulnerabilities

In This Chapter

Knowing your security threats

Understanding the available countermeasures

Catching attacks

Looking at some real-world examples

An RTLS, by nature of the silent and invisible technology character that enables real-time locating of assets or people over the air, introduces unique challenges to security. What’s accessible to an RTLS is potentially accessible to malicious hackers.

Any device implementing the same air interface can potentially access or jam the network. Attacks aren’t limited by location or distance. For example, Bluetooth attack tools are known to have several-mile radii, although valid usage scenarios would never attempt such coverage range for Bluetooth.

This chapter provides you with knowledge of the security challenges in an RTLS as well as strategies to counter them.

Evaluating Security Threats

An effective security strategy requires ensuring high availability, integrity trust, and confidentiality. With respect to an RTLS, some of the risks are similar to those of any products, some are exacerbated by wireless connectivity, and some are new.

The heart of the security problem in any RTLS is that the tags aren’t tethered with wires. The tags are small and carried by people or attached to assets, and the location sensors or the location engine can locate them with airborne techniques or protocols.

Remember.eps The very ease and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required