Abstract
Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.
- Bahl, P. and Padmanabhan, V. N. 2000. Radar: An in-building rf-based user location and tracking system. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 775--784.Google Scholar
- Battiti, R., Brunato, M., and Villani, A. 2002. Statistical learning theory for location fingerprinting in wireless LANs. Tech. Rep. DIT-02-086, University of Trento, Informatica e Telecomunicazioni.Google Scholar
- Brands, S. and Chaum, D. 1994. Distance-bounding protocols. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. 344--359. Google ScholarDigital Library
- Capkun, S. and Hubaux, J. 2006. Securing localization with hidden and mobile base stations. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google Scholar
- Capkun, S. and Hubaux, J. P. 2005. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1917--1928.Google Scholar
- Chen, Y., Francisco, J., Trappe, W., and Martin, R. P. 2006a. A practical approach to landmark deployment for indoor localization. In Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).Google Scholar
- Chen, Y., Kleisouris, K., Li, X., Trappe, W., and Martin, R. P. 2006b. The robustness of localization algorithms to signal strength attacks: a comparative study. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS). 546--563. Google ScholarDigital Library
- Doherty, L., Pister, K. S. J., and ElGhaoui, L. 2001. Convex position estimation in wireless sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1655--1663.Google ScholarCross Ref
- Elnahrawy, E., Li, X., and Martin, R. P. 2004. The limits of localization using signal strength: A comparative study. In Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON). 406--414.Google Scholar
- Enge, P. and Misra, P. 2001. Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Press.Google Scholar
- Hazas, M. and Ward, A. 2003. A high performance privacy-oriented location system. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). Google ScholarDigital Library
- Hightower, J., Borriello, G., and Want, R. 2000. Spoton: An indoor 3d location sensing technology based on rf signal strength. Tech. Rep. 00-02-02, University of Washington, Department of Computer Science and Engineering.Google Scholar
- Hu, Y., Perrig, A., and Johnson, D. 2003. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1976--1986.Google Scholar
- Lang, S. 1993. Real and Functional Analysis. Springer.Google Scholar
- Lazos, L., Poovendran, R., and Capkun, S. 2005. Rope: robust position estimation in wireless sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 324--331. Google ScholarDigital Library
- Li, Z., Trappe, W., Zhang, Y., and Nath, B. 2005. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 91--98. Google ScholarDigital Library
- Lim, H., Kung, L., Hou, J., and Luo, H. 2006. Zero-configuration, robust indoor localization: Theory and experimentation. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google Scholar
- Liu, D., Ning, P., and Du, W. 2005. Attack-resistant location estimation in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 99--106. Google ScholarDigital Library
- Madigan, D., Elnahrawy, E., Martin, R., Ju, W., Krishnan, P., and Krishnakumar, A. S. 2005. Bayesian indoor positioning systems. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 324--331.Google Scholar
- Niculescu, D. and Nath, B. 2001. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2926--2931.Google Scholar
- Priyantha, N., Chakraborty, A., and Balakrishnan, H. 2000. The cricket location-support system. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom). 32--43. Google ScholarDigital Library
- Roos, T., Myllymaki, P., and Tirri, H. 2002. A statistical modeling approach to location estimation. IEEE Trans. Mobile Comput. 1, 1 (Jan--March), 59--69. Google ScholarDigital Library
- Sastry, N., Shankar, U., and Wagner, D. 2003. Secure verification of location claims. In Proceedings of the ACM Workshop on Wireless Security. 1--10. Google ScholarDigital Library
- Savvides, A., Han, C.-C., and Srivastava, M. 2001. Dynamic fine-grained localization in ad hoc networks of sensors. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networking (MobiCom). Google ScholarDigital Library
- Shang, Y., Ruml, W., Zhang, Y., and Fromherz, M. P. J. 2003. Localization from mere connectivity. In Proceedings of the Fourth ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc). 201--212. Google ScholarDigital Library
- Tao, P. and Rudys, A., and Ladd, A. and Wallach, D. 2003. Wireless lan location-sensing for security applications. In Proceedings of the Second ACM Workshop on Wireless Security (WiSe). Google ScholarDigital Library
- Wilson, R. 2002. Propagation loss through common building materials, 2.4GHz vs. 5GHz. White paper available at http://www.magisnetworks.com.Google Scholar
- Youssef, M., Agrawal, A., and Shankar, A. U. 2003. WLAN location determination via clustering and probability distributions. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). 143--150. Google ScholarDigital Library
Index Terms
- A security and robustness performance analysis of localization algorithms to signal strength attacks
Recommendations
Achieving robust wireless localization resilient to signal strength attacks
Received signal strength (RSS) based algorithms have been very attractive for localization since they allow the reuse of existing communication infrastructure and are applicable to many commodity radio technologies. Such algorithms, however, are ...
The robustness of localization algorithms to signal strength attacks: a comparative study
DCOSS'06: Proceedings of the Second IEEE international conference on Distributed Computing in Sensor SystemsIn this paper, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We propose several performance metrics that quantify the ...
Comments