Skip to main content
Top

2018 | OriginalPaper | Chapter

Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location Systems

Authors : Gang Hu, Lixia Liu

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper investigates the location security problem of WLAN location systems under multipath communication scenarios. As the location information is critical in some location related applications, it is important to guarantee the user’s location security. The scheme that based on the signal’s arrival angle is an important kind of the location strategies. The selection of the direct path is critical to the accuracy of the system. We analyse the vulnerability of the angle based system. We show that if the system selects the incorrect direct path, it will potentially lead to a false position. By detailed simulation which based on quasi-mirror reflection model, we demonstrate that the manipulated false direct path can lead to error position effectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Kotaru, M., Joshi, K.R., Bharadia, D., Katti, S.: SpotFi: decimeter level localization using WiFi. In: Proceedings of ACM SIGCOMM, pp. 269–282, August 2015CrossRef Kotaru, M., Joshi, K.R., Bharadia, D., Katti, S.: SpotFi: decimeter level localization using WiFi. In: Proceedings of ACM SIGCOMM, pp. 269–282, August 2015CrossRef
3.
go back to reference Fang, S., Liu, Y., Shen, W., Zhu, H.-J.: Where are you from? Confusing location distinction using virtual multipath Camouflage. In: Proceedings of ACM MobiCom, pp. 225–236, September 2014 Fang, S., Liu, Y., Shen, W., Zhu, H.-J.: Where are you from? Confusing location distinction using virtual multipath Camouflage. In: Proceedings of ACM MobiCom, pp. 225–236, September 2014
4.
go back to reference Wang, T., Yang, Y.-L.: Analysis on perfect location spoofing attacks using beamforming. In: IEEE INFOCOM, pp. 2778–2786 (2013) Wang, T., Yang, Y.-L.: Analysis on perfect location spoofing attacks using beamforming. In: IEEE INFOCOM, pp. 2778–2786 (2013)
5.
go back to reference Xiong, J., Jamieson, K.: ArrayTrack: a fine-grained indoor location system. In: USENIX NSDI, pp. 71–84, April 2013 Xiong, J., Jamieson, K.: ArrayTrack: a fine-grained indoor location system. In: USENIX NSDI, pp. 71–84, April 2013
6.
go back to reference Kumer, S., Gil, S., Katabi, D., Rus, D.: Accurate indoor localization with zero start-up cost. In: Proceedings of ACM MobiCom, pp. 483–494, September 2014 Kumer, S., Gil, S., Katabi, D., Rus, D.: Accurate indoor localization with zero start-up cost. In: Proceedings of ACM MobiCom, pp. 483–494, September 2014
7.
go back to reference Liu, Y., Ning, P.: POSTER: mimicry attacks against wireless link signature. In: Proceedings of ACM CCS, pp. 801–803, October 2011 Liu, Y., Ning, P.: POSTER: mimicry attacks against wireless link signature. In: Proceedings of ACM CCS, pp. 801–803, October 2011
8.
go back to reference Xiong, J., Jamieson, K.: SecureArray: Improving wifi security with fine-grained physical-layer information. In: Proceedings of ACM MobiCom, pp. 441–452, September 2013 Xiong, J., Jamieson, K.: SecureArray: Improving wifi security with fine-grained physical-layer information. In: Proceedings of ACM MobiCom, pp. 441–452, September 2013
9.
go back to reference Lymberopoulos, D., Liu, J., Yang, X., Choudhury, R.R., Handziski, V., Sen, S.: A realistic evaluation and comparison of indoor location technologies: experiences and lessons learned. In: ACM IPSN, April 2015 Lymberopoulos, D., Liu, J., Yang, X., Choudhury, R.R., Handziski, V., Sen, S.: A realistic evaluation and comparison of indoor location technologies: experiences and lessons learned. In: ACM IPSN, April 2015
10.
go back to reference Kumar, M., Hamed, E., Katabi, D., Li, L.E.: LTE radio analytics made easy and accessible. In: Proceedings of ACM SIGCOMM, pp. 211–222, August 2014 Kumar, M., Hamed, E., Katabi, D., Li, L.E.: LTE radio analytics made easy and accessible. In: Proceedings of ACM SIGCOMM, pp. 211–222, August 2014
11.
go back to reference Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Computers 62(3), 417–427 (2013)MathSciNetCrossRef Cai, Z., Wang, Z., Zheng, K., Cao, J.: A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Computers 62(3), 417–427 (2013)MathSciNetCrossRef
12.
go back to reference Liu, S., Cai, Z., Hong, X., Ming, X.: Towards security-aware virtual network embedding. Comput. Netw. 91, 151–163 (2015)CrossRef Liu, S., Cai, Z., Hong, X., Ming, X.: Towards security-aware virtual network embedding. Comput. Netw. 91, 151–163 (2015)CrossRef
13.
go back to reference Liu, S., Cai, Z., Xu, H., Xu, M.: Security-aware virtual network embedding. In: Proceedings of ICC (2014) Liu, S., Cai, Z., Xu, H., Xu, M.: Security-aware virtual network embedding. In: Proceedings of ICC (2014)
Metadata
Title
Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location Systems
Authors
Gang Hu
Lixia Liu
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00021-9_19

Premium Partner