System and method for determining physical location of a node in a wireless network during an authentication check of the node

ABSTRACT

A system and method for providing security to a wireless network by using a mobile node&#39;s location as a parameter for deciding if access is to be given to the node. The system and method employ access points, wireless routers and mobile nodes, each including at least one transceiver adapted to transmit and receive communication signals to and from other wireless routers, mobile nodes and other mobile access points. Each access point is connected to a network management system which allows enhanced network monitoring and control. Each network node includes technology which may determine an absolute node location containing latitude, longitude and altitude of a node, or a relative node location containing the distance and angle between nodes, or a combination of both absolute and relative location data.

This application claims benefit under 35 U.S.C. §119(e) from U.S.provisional patent application Ser. No. 60/398,834 entitled “A SystemAnd Method For Determining Physical Location Of A Node In A WirelessNetwork During An Authentication Check Of The Node”, filed Jul. 29,2002, the entire contents of which is incorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a system and method for providingsecurity for a wireless network, such as an ad-hoc wirelesscommunications network, based on the position information relating tomobile nodes. More particularly, the present invention relates to asystem and method for trusted infrastructure devices to compute thelocation of a mobile node in a wireless communications network, such asan ad-hoc terrestrial wireless communications network, during theauthentication process.

2. Description of the Related Art

Wireless communications networks, such as mobile wireless telephonenetworks, have become increasingly prevalent over the past decade. Thesewireless communications networks are commonly referred to as “cellularnetworks” because the network infrastructure is arranged to divide theservice area into a plurality of regions called “cells”.

Specifically, a terrestrial cellular network includes a plurality ofinterconnected base stations that are distributed geographically atdesignated locations throughout the service area. Each base stationincludes one or more transceivers that are capable of transmitting andreceiving electromagnetic signals, such as radio frequency (RF)communications signals, to and from user nodes, such as wirelesstelephones, located within the base station coverage area. Thecommunications signals include, for example, voice data that has beenmodulated according to a desired modulation technique and transmitted asdata packets. As can be appreciated by one skilled in the art, thetransceiver and user nodes transmit and receive such data packets inmultiplexed format, such as time-division multiple access (TDMA) format,code-division multiple access (CDMA) format, or frequency-divisionmultiple access (FDMA) format, which enables a single transceiver at thebase station to communicate simultaneously with several user nodes init's coverage area.

In recent years, a type of mobile communications network known as an“ad-hoc” network has been developed for use by the military. In thistype of network, each user node is capable of operating as a basestation or router for the other user nodes, thus eliminating the needfor a fixed infrastructure of base stations. Details of an ad-hocnetwork are set forth in U.S. Pat. No. 5,943,322 to Mayor, the entirecontent of which is incorporated herein by reference.

More sophisticated ad-hoc networks are also being developed which, inaddition to enabling user nodes to communicate with each other as in aconventional ad-hoc network, further enable the user nodes to access afixed network and thus communicate with other user nodes, such as thoseon the public switched telephone network (PSTN), and on other networkssuch as the Internet. Details of these types of ad-hoc networks aredescribed in U.S. patent application Ser. No. 09/897,790 entitled “AdHoc Peer-to-Peer Mobile Radio Access System Interfaced to the PSTN andCellular Networks”, filed on Jun. 29, 2001, and in U.S. patentapplication Ser. No. 09/815,157 entitled “Time Division Protocol for anAd-Hoc, Peer-to-Peer Radio Network Having Coordinating Channel Access toShared Parallel Data Channels with Separate Reservation Channel”, filedon Mar. 22, 2001, the entire content of each being incorporated hereinby reference.

In either conventional wireless communications networks, or in ad-hocwireless communications networks, it may be necessary or desirable toknow or determine the geographic location of user nodes. Different typesof location determining services and techniques for wirelesscommunications networks are described in a publication by Nokia whichcan be found on the Nokia website at“www.nokia.com/press/background/pdf/mlbs.pdf”, the entire content ofwhich being incorporated herein by reference. In particular, the Nokiadocument states that location identification services are currentlyprovided in wireless communications networks based on three majortechnologies. One of these technologies uses cell identificationcombined with Round Trip Time (RTT), Timing Advance (TA) and MeasuredSignal level (RX level), Time Difference of Arrival (TDOA) and Angle OfArrival (AOA) techniques, the details of which can be appreciated by oneskilled in the art. A second technology uses cellular signal timingbased methods for code division multiple access (CDMA) and wideband codedivision multiple access (WCDMA). The third technology described in theNokia document employs Global Positioning System (GPS) techniques.

Another list of methods and techniques currently used in the wirelesscommunications industry for providing location services can be found at“www.911dispatch.com/911_file/location_tech.html”, the entire content ofwhich being incorporated herein by reference. Although the GPS techniqueis the last technique mentioned in this list, it is generally viewed asbeing more accurate than all of the other methods. Further details anddescriptions of GPS based methods are set forth in a publication by J.J. Spilker Jr. entitled “Satellite Constellation and Geometric Dilutionof Precision”, in a publication by P. Axelrad et al. entitled “GPSNavigation Algorithms”, in a publication by Bradford W. Parkinsonentitled “GPS Error Analysis”, and in a publication by N. Ashby et al.Entitled “Introduction to Relativistic Effects on the Global PositioningSystem”, each found in “GPS—Theory and Applications”, American Instituteof Astronautics, 1996, the entire content of each being incorporatedherein by reference.

Despite the fact that the GPS technique has been in use for aconsiderable period of time and most of the world's navigation relies onthis technique, the GPS technique is very susceptible to errors inmeasurement. Therefore, the GPS technique is capable of providinglocation determination results with very high accuracy only afterperforming a relatively large number of measurements to remove sucherrors. A description of the shortcomings of GPS is set forth in adocument by IMA entitled “Mathematical Challenges in Global PositioningSystems (GPS)” which can be found at “www.ima.umn.edu/gps”, the entirecontent of this document being incorporated herein by reference. Certainother tests also demonstrate that the GPS technique is unsuitable forterrestrial-based networks.

In addition, other methods and techniques which do not use GPSsatellites for determining mobile station locations in a wirelesscommunications network typically require that the signal from the mobilestation be received by at least two cell sites that can measure andprocess the delay between signal arrivals, identify the direction of thesignal based on “path signature”, and determine the distance betweenmobile station and the cell towers. In all of these methods, informationprocessing is executed in a designated central processing unit (CPU)which is typically located at a cell tower next to the base station(BTS). Also, most of these methods were designed to comply with E911requirements without requiring that excessive modifications be made toexisting wireless communications systems. Examples of other locationdetermining techniques are set forth in a document by CERN—EuropeanOrganization for Nuclear Research, which can be found at“rkb.home.cern.ch/rkb/ANI16pp/node98.html#SECTION00098000000000000000”,in a document by Wendy J Woodbury Straight entitled “Exploring a NewReference System”, which can be found at“menstorsoftwareince.com/profile/newref.html”, and in a documententitled “An Introduction to SnapTrac Server-Aided GPS Technology”,which can be found at “www.snaptrack.com/pdf/ion.pdf”, the entirecontent of each being incorporated herein by reference. Additionaldetails may also be found in U.S. patent application Ser. No. 09/988,001entitled “A System and Method for Computing the Location of a MobileTerminal in a Wireless Communications Network”, filed on Nov. 16, 2001,which describes a system and method for determining location with theuse of technologies such as GPS, the entire content being incorporatedherein by reference.

Accordingly, a need exists for a system and method for determining thelocation of a mobile user node in a wireless communications network bytrusted infrastructure devices to determine if the device is physicallywithin a predetermined “safe zone”, and provide access to the networkbased on this location determination.

SUMMARY OF THE INVENTION

An object of the present invention is to provide a system and method fordetermining if a mobile node is physically located within apredetermined area of coverage. This may be accomplished with eitherabsolute latitude/longitude location, or by a relative location to aknown piece of infrastructure.

Another object of the present invention is to provide a system andmethod for providing network access to a mobile node based on determinedlocation.

These and other objects are substantially achieved by providing a systemand method for obtaining the location of a node in a wirelesscommunications network and using the location information whendetermining if the node should be allowed access to the network. Thewireless communications network can be an ad-hoc wireless communicationsnetwork with each node and reference node being adapted to operate inthe ad-hoc wireless communications network. The system and methodfurther performs the operation of estimating a respective distance fromthe node to each of the reference nodes based on the respective signalsreceived at the node, calculating a respective simulated pattern, suchas a sphere or circle about each of the respective reference nodes basedon the respective distance from the node to each respective referencenode and the respective locations of the respective reference nodes,estimating a location at which each of the simulated patterns intersecteach other, and identifying the estimated location as representing thelocation of the node. When estimating the respective distances from thenode to the reference nodes, the system and method can also performerror minimizing techniques.

The system and method of the present invention determines if a mobilenode is physically located in a secure area by the authentication serveror it's agent. The location determination agent, at the request of theauthentication server, initiates multiple (optimally 4, but at leastone) range measurements taken from trusted infrastructure devices(wireless routers or access points) whose physical location is known.These measurements along with the infrastructure device locations arefed into the position algorithm that calculates the mobile node'slocation. If the result of the algorithm (i.e mobile node's location) iswithin the physical perimeter defined by the network administrator, thenthe authentication server receives a confirmation that the mobile nodeis within the building or area and can proceed with the authenticationconfirmation.

This algorithm is essentially identical to the location calculationalgorithm that a mobile node may perform in other applications. However,in an embodiment of the present invention, all measurements are underthe physical control of assets owned by the network administrator. Also,the position algorithm used is under the control of the trustedauthentication server, and avoids relying on the mobile node to providea valid answer.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other objects, advantages and novel features of the inventionwill be more readily appreciated from the following detailed descriptionwhen read in conjunction with the accompanying drawings, in which:

FIG. 1 is a block diagram of an example of an ad-hoc packet switchedwireless communications network including a plurality of nodes employingan embodiment of the present invention;

FIG. 2 is a block diagram illustrating an example of a node employed inthe network shown in FIG. 1;

FIG. 3 is a diagram illustrating an example of the maximum and secureranges of an infrastructure device in accordance with an embodiment ofthe present invention;

FIG. 4 is a diagram illustrating an example of a network layout withmultiple infrastructure devices which have a radio ranges which extendbeyond the desired secure area in accordance with an embodiment of thepresent invention;

FIG. 5 is a diagram illustrating an example of the secure ranges foreach wireless router in FIG. 4 in accordance with an embodiment of thepresent invention;

FIG. 6 is a diagram illustrating an example location of several mobilenodes which are within radio range of the wireless network in FIG. 4 inaccordance with an embodiment of the present invention; and

FIG. 7 is a ladder diagram illustrating an example of the flow ofmessages between devices during the authorization process in accordancewith an embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Wireless nodes wishing to obtain access to an enterprise LAN aretypically required to authenticate themselves via the IP standard.Although this verifies that the user has the required challengeinformation, it does not prevent a computer that has been compromisedfrom accessing the network. Due to the wireless interface, a userdoesn't have to be inside the building in order to obtain access. Thus,a compromised computer with a wireless interface could be outside abusiness' secured environment, such as sitting in a parking lot, andobtain full access to the network services within a business building.Unlike a wired network, the wireless user doesn't need to pass thephysical security checks such as a guard desk to obtain building accessprior to plugging into the LAN.

In an embodiment of the present invention, or any other wirelesstechnology which could be extended to add a location measurement (e.g.802.11), the authentication server can request the wireless routers oraccess points to take time of flight measurements and report either thetime of flight or the calculated distance. The authentication server canthen determine if the location of the wireless user is within a definedspace, such as a building outline, and the authentication server mayreject users that are outside the perimeter.

FIG. 1 is a block diagram illustrating an example of a wirelesscommunications network 100 employing mobile access nodes, or terminals,according to an embodiment of the present invention. As shown in FIG. 1,network 100 includes a plurality of devices, including access points(101-1 to 101-2), wireless routers (102-1 to 102-n) and mobile nodes(103-1 to 103-n) on the wireless side of the network, and a NetworkOperations Center 104 on the wired part of the network. Further detailsof the network 100 and its operation will now be described. For purposesof this discussion, the terms “user terminal” and “mobile node” will beused interchangeably.

As shown in FIG. 2, each access point 101, wireless routers 102 andmobile node 103 includes at least one transceiver 106 and at least onecontroller 107. Each transceiver 106 is coupled to an antenna 109 andcan transmit and receive data packets over any frequency band, forexample, over the 2nd Institutional Scientific Medical (ISM) band.

The frequency and modulation scheme used by the transceiver 106 however,does not impact the implementation of the mobile access points 101,wireless routers 102, or nodes 103. Each node 101, 102 and 103 furtherincludes a memory 108, such as a random access memory (RAM), that iscapable of storing, among other things, routing information pertainingto itself and other nodes in the network 100. Certain nodes, inparticular, mobile nodes 103-1 through 103-n, can be coupled to a hostdevice 110, such as a personal computer (PC), personal data assistant(PDA), or any other suitable device for use by a user.

Each access point 101 and wireless router 102 maintains knowledge oftheir geographic location. This information may be manually entered, orthe devices may include positioning functionality, such as globalpositioning system (GPS) functionality, differential navigationfunctionality, or other positioning functionality such as varioustriangulation techniques as can be appreciated by one skilled in theart, or as described in U.S. patent application Ser. No. 09/988,001referenced above, and in a U.S. patent application of Eric A. Whitehill,Ser. No. 09/973,799, for “A System And Method For Efficiently PerformingTwo-Way Ranging To Determine The Location Of A Wireless Node In ACommunications Network”, filed on Oct. 11, 2001, the entire contents ofwhich being incorporated herein by reference.

Referring to FIG. 1, each node 101, 102 and 103 can be in communicationwith the Network Operations Center 104, either directly or via othernodes. The Network Communication Center typically consists of equipmentused to configure and manage the wireless network, however, for thepurposes of this description, only the Authentication, Authorization andAccounting (AAA) server 105 is shown.

Coverage graph 112 of FIG. 3 shows an example of a network 100deployment where a single access point 101 is used to provide wirelesscoverage to an area, such as an office, bounded by an office perimeter114. In this example, the range of the transceiver 106 of the accesspoint 101, shown bounded by 116, is greater than the perimeter 114 ofthe office. This could potentially allow an unauthorized user, locatedbeyond the perimeter 114 but within the bounded area 116, to access thenetwork 100. As part of the configuration of the network 100, however,the maximum radius of the transceiver range of access point 101 whichguarantees that the user is physically in the secure space isdetermined. This range, shown bounded by 118, is subsequently usedduring the authorization process to determine if a node requestingaccess is within a network access restrict boundary.

Coverage graph 120 of FIG. 4 shows an example of a larger network 100configuration consisting of a single access point 101 and four wirelessrouters 102-1, 102-2, 102-3 and 102-4. In this example, the range of thetransceiver 106 of each wireless router, shown bounded by 116-1, 116-2,116-3 and 116-4 respectively, is greater than the perimeter 114 of theoffice, which could potentially allow an unauthorized user to access thenetwork as described in FIG. 3. Therefore, as in FIG. 3, a maximumradius of each transceiver range which guarantees that the user isphysically in the secure space is determined and subsequently usedduring the authorization process as shown in FIG. 5. As described ingreater detail below, in each of FIGS. 3, 4 and 5, nodes requestingaccess to the network are first located by the fixed devices 101 and 102within the network. Location of the requesting node is determined bymeasuring a distance at which the requesting node is located from afixed device, including both wireless routers 102 and access point 101.If the requesting node is located within the secure space 118, accessfor the node is allowable on the basis of position.

Due to the placement of the devices in FIGS. 4 and 5 however, simplyutilizing the distance of a mobile node to a wireless router may beinsufficient for determining if the node is in the secure zone of anyone wireless router, shown bounded by 118-1, 118-2, 118-3 and 118-4respectively. As shown in coverage graph 124 of FIG. 6, mobile nodes103-2 and 103-3 are both beyond the secure space of each fixed device,however, node 103-2 is located within the perimeter 114 and should beallowed access to the network on the basis of position. As described ingreater detail below, the distance between each mobile node 103-1, 103-2and 103-3 and multiple infrastructure devices must be determined todecide if the “absolute location” of a mobile node is within theperimeter 114, as shown in the coverage graph 124 of FIG. 6.

The ladder diagram 126 of FIG. 7 shows an example of the process flowthat occurs for one embodiment of the present invention. Using thecoverage graph 124 of FIG. 6 as an example, the process flow of FIG. 7may be used to accurately locate mobile nodes requesting access andrestrict network access based upon improper node location. Referring toFIGS. 6 and 7, the restricted access process of the embodiment of thepresent invention begins when a mobile node, such as node 103-2, powersup and the transceiver 106 of the node chooses a path to an access point101, such as via the wireless router 102-1. The mobile node 103-2 sendsa request to join the wireless network 100 and the wireless router 102-1passes the message to the access point 101, which in turn passes themessage to the Authentication, Authorization and Accounting (AAA) server105.

As part of the authentication process, the AAA server 105 sends amessage to the access point 101 requesting the range information of themobile node 103-2, such as the location of the wireless router 102-1,and the distance between wireless router and the mobile device 103-2.The access point 101 receives the message from the AAA server and sendsa request to the wireless router 102-1 to determine the distance betweenthe mobile device 103-2 and the wireless router 102-1. The wirelessrouter 102-1 executes a series of measurements, such as time of flightmeasurements, and determines the requested distance information, whichis then sent to the AAA server 105 via the access point 101. The AAAserver then calculates a position for the mobile node 103-2 anddetermines if the mobile node is within a secure zone 118-1, that is,within a zone in which network access by mobile nodes is allowed.

If the mobile node 103-2 is not found within the secure zone 118-1 bymeasurements provided by the wireless router 102-1, the AAA server 105sends a request for an “absolute position” determination to the accesspoint 101. The access point then requests neighboring wireless routers,such as 102-2, 102-3 and 102-4, to determine the distance between mobilenode 103-2 and each wireless router 102-2, 102-3 and/or 102-4respectively. In addition, the access point 101 may also determine thedistance between the mobile node 103-2 and the access point 101. Eachwireless router executes a series of measurements, such as time offlight measurements, and determines the requested distance information,which is then sent to the access point 101.

Upon receiving the additional distance information, the access point 101calculates the absolute position of the mobile node 103-2 and sends theresult to the AAA server 105. The AAA server 105 evaluates the absoluteposition of the mobile node 103-2 and determines if the mobile node iswithin the perimeter 114, and if so, sends a response to the originalrequest for access from the wireless router 102-1 to allow the mobilenode 103-2 to join the network on the basis of location.

There can be variations to the process flow in FIG. 7. For example, inanother embodiment of the present invention, the AAA server 105 mayrequest an absolute location without previously requesting the rangeinformation. The AAA server 105 may perform the calculations todetermine if the mobile node 103 is in the secure zone, or it may sendthe information to an agent and subsequently use the agent's response.In each embodiment, the AAA server requests and receives locationinformation and uses the location information received as part of thedecision to provide service to the node.

In embodiments of the invention described above, security is maintainedas the mobile nodes 103 cannot “spoof” the time of flight measurementused, since any attempt at processing the message would only delay thesignal's return and effectively cause a greater distance to becalculated. Likewise, the mobile nodes 103 cannot provide an erroneouslocation since it they never queried for a self-determined location. Alllocation determinations are done by infrastructure devices under controlof the network.

Although only a few exemplary embodiments of the present invention havebeen described in detail above, those skilled in the art will readilyappreciate that many modifications are possible in the exemplaryembodiments without materially departing from the novel teachings andadvantages of this invention. Accordingly, all such modifications areintended to be included within the scope of this invention as defined.

1. A method for restricting network access between nodes in an ad-hoccommunications network, said nodes being adapted to transmit and receivesignals to and from other nodes in said ad-hoc network, the methodcomprising: controlling a first node in an ad-hoc communications networkto receive a request for network access from a second node and inresponse, controlling at least one node in said network to calculate alocation of said second node; and controlling said first node to allowsaid second node to have access to said network if said location of saidsecond node is within a network access restriction boundary.
 2. A methodas claimed in claim 1, further comprising: calculating said location ofsaid second node based on at least one of a time of flight calculation,a known location of said first node and a known location of said atleast one node.
 3. A method as claimed in claim 2, further comprising:calculating said known location of said first node and said at least onenode based on at least one of manual position entry, global positioning,differential navigation and triangulation.
 4. A method as claimed inclaim 1, wherein said at least one node includes said first node.
 5. Amethod as claimed in claim 1, further comprising: controlling said firstnode to communicate said request for network access to a third node. 6.A method as claimed in claim 5, wherein said third node is coupled to anetwork operations center.
 7. A method as claimed in claim 5, whereinsaid third node includes an authentication, authorization and accountingserver.
 8. A method as claimed in claim 5, further comprising:controlling said third node to communicate to said first node a requestfor said location calculation of said second node and in response,controlling said first node to calculate said location of said secondnode and communicate said location to said third node
 9. A method asclaimed in claim 5, further comprising: controlling said third node tocontrol said first node to allow said second node to have access to saidnetwork if said location of said second node is within said networkaccess restriction boundary.
 10. A method as claimed in claim 5, furthercomprising: controlling said third node to communicate a request for anabsolute location of said second node to said first node of said ad-hoccommunications network and in response, controlling said first node tocalculate said absolute location and communicate said absolute locationto said third node; and controlling said third node to control saidfirst node to allow said second node to have access to said network ifsaid absolute location of said second node is within said network accessrestriction boundary.
 11. A method as claimed in claim 10, furthercomprising: controlling said first node to calculate said absolutelocation of said second node based on said known location of at leastone node of said network and a calculated location of said second noderelative to said at least one node.
 12. A system, adapted to restrictnetwork access between nodes in an ad-hoc communications network, saidnodes being adapted to transmit and receive signals to and from othernodes in said ad-hoc network, the system comprising: a first node insaid ad-hoc communications network, adapted to receive a request fornetwork access from a second node and in response, to calculate alocation of said second node; and said first node being further adaptedto allow said second node to have access to said network if saidlocation of said second node is within a network access restrictionboundary.
 13. A system as claimed in claim 12, wherein: said first nodeis further adapted to calculate said location of said second node basedon at least one of a time of flight calculation, a known location ofsaid first node and a known location of at least one node.
 14. A systemas claimed in claim 13, wherein: said first node is further adapted tocalculate said known location of said first node and said at least onenode based on at least one of manual position entry, global positioning,differential navigation and triangulation.
 15. A system as claimed inclaim 12, wherein said at least one node includes said first node.
 16. Asystem as claimed in claim 12, wherein: said first node is furtheradapted to communicate said request for network access to a third node.17. A system as claimed in claim 16, wherein said third node is coupledto a network operations center.
 18. A system as claimed in claim 16,wherein said third node includes an authentication, authorization andaccounting server.
 19. A system as claimed in claim 16, wherein: saidthird node is adapted to communicate to said first node a request forsaid location calculation and in response, said first node is furtheradapted to calculate said location of said second node and communicatesaid location to said third node
 20. A method as claimed in claim 16,wherein: said third node is further adapted to control said first nodeto allow said second node to have access to said network if saidlocation of said second node is within said network access restrictionboundary.
 21. A method as claimed in claim 16, wherein: said third nodeis further adapted to communicate a request for an absolute location ofsaid second node to said first node of said ad-hoc communicationsnetwork and in response, said first node is further adapted to calculatesaid absolute location and communicate said absolute location to saidthird node; and said third node is further adapted to control said firstnode to allow said second node to have access to said network if saidabsolute location of said second node is within said network accessrestriction boundary.
 22. A method as claimed in claim 21, wherein: saidfirst node is further adapted to calculate said absolute location ofsaid second node based on said known location of at least one node ofsaid network and a calculated location of said second node relative tosaid at least one node.
 23. A computer-readable medium of instructions,adapted to restrict network access between nodes in an ad-hoccommunications network, said nodes being adapted to transmit and receivesignals to and from other nodes in said ad-hoc network, comprising: afirst set of instructions, adapted to control a first node in saidad-hoc communications network to receive a request for network accessfrom a second node and in response, to calculate a location of saidsecond node; and a second set of instructions, adapted to control saidfirst node to allow said second node to have access to said network ifsaid location of said second node is within a network access restrictionboundary.
 24. A computer-readable medium of instructions as claimed inclaim 23, wherein: said first set of instructions is further adapted tocontrol said first node to calculate said location of said second nodebased on at least one of a time of flight calculation, a known locationof said first node and a known location of at least one node.
 25. Acomputer-readable medium of instructions as claimed in claim 24,wherein: said first set of instructions is further adapted to controlsaid first node to calculate said known location of said first node andsaid at least one node based on at least one of manual position entry,global positioning, differential navigation and triangulation.
 26. Acomputer-readable medium of instructions as claimed in claim 23,wherein: said first set of instructions is further adapted to controlsaid first node to communicate said request for network access to athird node.
 27. A computer-readable medium of instructions as claimed inclaim 26, further comprising: a third set of instructions, adapted tocontrol said third node to communicate to said first node a request forsaid location calculation and in response, said first set ofinstructions is further adapted to control said first node to calculatesaid location of said second node and communicate said location to saidthird node
 28. A computer-readable medium of instructions as claimed inclaim 27, wherein: said second set of instructions is further adapted tocontrol first node to allow said second node to have access to saidnetwork if said location of said second node is within said networkaccess restriction boundary.
 29. A computer-readable medium ofinstructions as claimed in claim 27, wherein: said third set ofinstructions is further adapted to control said third node tocommunicate a request for an absolute location of said second node tosaid first node of said ad-hoc communications network and in response,said first set of instructions is further adapted to control said firstnode to calculate said absolute location and communicate said absolutelocation to said third node; and said second set of instructions isfurther adapted to control first node to allow said second node to haveaccess to said network if said absolute location of said second node iswithin said network access restriction boundary.
 30. A computer-readablemedium of instructions as claimed in claim 29, wherein: said first setof instructions is further adapted to control said first node tocalculate said absolute location of said second node based on said knownlocation of at least one node of said network and a calculated locationof said second node relative to said at least one node.