[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Toward attack-resistant localization under infrastructure attacks

Published: 01 April 2012 Publication History

Abstract

Trustworthy location information is important because it is a critical input to a wide variety of location-based applications. However, the localization infrastructure is vulnerable to physical attacks, and consequently, the localization results are affected. In this paper, we aim to achieve robust localization under infrastructure attacks. We first investigated the impact of infrastructure attacks on localization and showed that the performance of location estimations degraded significantly under the attack. We then derived an attack-resistant scheme that is not algorithm specific and can be integrated with existing localization algorithms. Our attack-resistant scheme exploited the characteristics of the geometric patterns returned by location estimates under the attack; that is, the localization results of a wireless device under the normal situation were clearly clustered together, whereas the localization results were scattered when an attack was present. Thus, our attack-resistant scheme is grounded on K-means clustering analysis of intra-distance of localization results from all possible combinations of any three access points. To evaluate the effectiveness and scalability of our proposed scheme, we used received signal strength for validation and applied our approach to three broad classes of localization algorithms: lateration based, fingerprint matching, and Bayesian networks. We validated our scheme in the ORBIT test bed (North Brunswick, NJ, USA) using an 802.11 (Wi-Fi) network and in a real office building environment using an 802.15.4 (ZigBee) network. The extensive experimental results demonstrated that the application of our scheme could help the broad range of localization algorithms to achieve comparable or even better localization performance when under infrastructure attacks as compared with normal situations without attack, thus, effectively eliminating the effects of infrastructure attacks. Copyright © 2011 John Wiley & Sons, Ltd.

References

[1]
Akkaya K, Younis M. A survey on routing protocols for wireless sensor networks, Ad Hoc Networks 2005; 3: 325–349.
[2]
Enge P, Misra P. Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Press: Lincoln, MA, USA, 2001.
[3]
Priyantha N, Chakraborty A, Balakrishnan H. The cricket location-support system. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), ACM: New York, NY, USA, August 2000; 32–43.
[4]
Rong P, Sichitiu M. Angle of arrival localization for wireless sensor networks. Sensor and Ad Hoc Communications and Networks, 2006. SECON ‘06. 2006 3rd Annual IEEE Communications Society on, Vol. 1, IEEE Computer Society: NY, New York, USA, September 2006; 374–382.
[5]
Bahl P, Padmanabhan VN. RADAR: an in-building RF-based user location and tracking system. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, March 2000; 775–784.
[6]
Chen Y, Francisco J, Trappe W, Martin RP. A practical approach to landmark deployment for indoor localization. In Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), IEEE Communication Society: New York, NY, USA, September 2006.
[7]
Kleisouris K, Chen Y, Yang J, Martin RP. The impact of using multiple antennas on wireless localization. In Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), IEEE Communication Society: New York, NY, USA, June 2008.
[8]
Chen Y, Kleisouris K, Li X, Trappe W, Martin RP. A security and robustness performance analysis of localization algorithms to signal strength attacks. ACM Transactions on Sensor Networks (ACM TOSN) February 2009; 5(1): 1–37.
[9]
Li Z, Trappe W, Zhang Y, Nath B. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), IEEE Signal Processing Society: Piscataway, NY, USA, 2005; 91–98.
[10]
Liu D, Ning P, Du W. Attack-resistant location estimation in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), IEEE Signal Processing Society: Piscataway, NY, USA, 2005; 99–106.
[11]
Want R, Hopper A, Falcao V, Gibbons J. The active badge location system, ACM Transactions on Information Systems 1992, January; 10(1): 91–102.
[12]
Yang J, Chen Y. A theoretical analysis of wireless localization using RF-based fingerprint matching. In Proceedings of the Fourth International Workshop on System Management Techniques, Processes, and Services (SMTPS), April 2008.
[13]
Patwari N, Ash JN, Kyperountas S, Hero AO, Moses RL, Correal NS. Locating the nodes. IEEE Signal Processing Magazine, July 2005.
[14]
Elnahrawy E, Li X, Martin RP. The limits of localization using signal strength: A comparative study. In Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON 2004), IEEE Communication Society: New York, NY, USA, October 2004; 406–414.
[15]
Shang Y, Ruml W, Zhang Y, Fromherz MPJ. Localization from mere connectivity, In Proceedings of the Fourth ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), ACM: New York, NY, USA, June 2003; 201–212.
[16]
He T, Huang C, Blum B, Stankovic JA, Abdelzaher T. Range-free localization schemes in large scale sensor networks. In Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking (MobiCom'03), ACM: New York, NY, USA, 2003.
[17]
Niculescu D, Nath B. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), IEEE Communication Society: New York, NY, USA, 2001; 2926–2931.
[18]
Doherty L, Pister KSJ, ElGhaoui L. Convex position estimation in wireless sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, April 2001; 1655–1663.
[19]
Langendoen K, Reijers N. Distributed localization in wireless sensor networks: a quantitative comparison. Computer Networks 2003; 43(4): 499–518.
[20]
Chintalapudi K, Dhariwal A, Govindan R, Sukhatme G. Ad hoc localization using ranging and sectoring. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, March 2004.
[21]
Yang J, Chen Y. Indoor localization using improved RSS-Based lateration methods. In IEEE Globecom 2009 Wireless Networking Symposium, Honolulu, Hawaii, IEEE Communication Society: New York, NY, USA, November 2009.
[22]
Youssef M, Agrawal A, Shankar AU. WLAN location determination via clustering and probability distributions. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE Communication Society: New York, NY, USA, March 2003; 143–150.
[23]
Roos T, Myllymaki P, Tirri H. A statistical modeling approach to location estimation, IEEE Transactions on Mobile Computing 2002, January–March; 1(1): 59–69.
[24]
Sastry N, Shankar U, Wagner D. Secure verification of location claims. In Proceedings of the ACM workshop on wireless security, ACM: New York, NY, USA, 2003; 1–10.
[25]
Capkun S, Hubaux JP. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, 2005; 1917–1928.
[26]
Capkun S, Hubaux J. Securing localization with hidden and mobile base stations. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, March 2006.
[27]
Jones K, Liu L. What where Wi: An analysis of millions of Wi-Fi access points. In Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on May 2007.
[28]
Sarkar T, Ji Z, Kim K, Medouri A, Salazar-Palma M. A survey of various propagation models for mobile communication. Antennas and Propagation Magazine, IEEE 2003, June; 45(3): 51–82.
[29]
Goldsmith A. Wireless communications. Cambridge University Press: New York, NY, 2005.
[30]
Hastie T, Tibshirani R, Friedman J. The elements of statistical learning, data mining inference, and prediction. Springer: New York, NY, 2001.
[31]
Madigan D, Elnahrawy E, Martin R, Ju W, Krishnan P, Krishnakumar AS. Bayesian indoor positioning systems. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), IEEE Communication Society: New York, NY, USA, March 2005; 324–331.

Cited By

View all
  • (2015)Protecting multi-lateral localization privacy in pervasive environmentsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2015.247888123:5(1688-1701)Online publication date: 1-Oct-2015
  1. Toward attack-resistant localization under infrastructure attacks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Security and Communication Networks
      Security and Communication Networks  Volume 5, Issue 4
      April 2012
      95 pages
      ISSN:1939-0114
      EISSN:1939-0122
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 April 2012

      Author Tags

      1. infrastructure attacks
      2. received signal strength
      3. secure localization
      4. wireless localization

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2015)Protecting multi-lateral localization privacy in pervasive environmentsIEEE/ACM Transactions on Networking (TON)10.1109/TNET.2015.247888123:5(1688-1701)Online publication date: 1-Oct-2015

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media