skip to main content
research-article

A security and robustness performance analysis of localization algorithms to signal strength attacks

Published:11 February 2009Publication History
Skip Abstract Section

Abstract

Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.

References

  1. Bahl, P. and Padmanabhan, V. N. 2000. Radar: An in-building rf-based user location and tracking system. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 775--784.Google ScholarGoogle Scholar
  2. Battiti, R., Brunato, M., and Villani, A. 2002. Statistical learning theory for location fingerprinting in wireless LANs. Tech. Rep. DIT-02-086, University of Trento, Informatica e Telecomunicazioni.Google ScholarGoogle Scholar
  3. Brands, S. and Chaum, D. 1994. Distance-bounding protocols. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. 344--359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Capkun, S. and Hubaux, J. 2006. Securing localization with hidden and mobile base stations. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  5. Capkun, S. and Hubaux, J. P. 2005. Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1917--1928.Google ScholarGoogle Scholar
  6. Chen, Y., Francisco, J., Trappe, W., and Martin, R. P. 2006a. A practical approach to landmark deployment for indoor localization. In Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).Google ScholarGoogle Scholar
  7. Chen, Y., Kleisouris, K., Li, X., Trappe, W., and Martin, R. P. 2006b. The robustness of localization algorithms to signal strength attacks: a comparative study. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS). 546--563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Doherty, L., Pister, K. S. J., and ElGhaoui, L. 2001. Convex position estimation in wireless sensor networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1655--1663.Google ScholarGoogle ScholarCross RefCross Ref
  9. Elnahrawy, E., Li, X., and Martin, R. P. 2004. The limits of localization using signal strength: A comparative study. In Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON). 406--414.Google ScholarGoogle Scholar
  10. Enge, P. and Misra, P. 2001. Global Positioning System: Signals, Measurements and Performance. Ganga-Jamuna Press.Google ScholarGoogle Scholar
  11. Hazas, M. and Ward, A. 2003. A high performance privacy-oriented location system. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hightower, J., Borriello, G., and Want, R. 2000. Spoton: An indoor 3d location sensing technology based on rf signal strength. Tech. Rep. 00-02-02, University of Washington, Department of Computer Science and Engineering.Google ScholarGoogle Scholar
  13. Hu, Y., Perrig, A., and Johnson, D. 2003. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1976--1986.Google ScholarGoogle Scholar
  14. Lang, S. 1993. Real and Functional Analysis. Springer.Google ScholarGoogle Scholar
  15. Lazos, L., Poovendran, R., and Capkun, S. 2005. Rope: robust position estimation in wireless sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 324--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Li, Z., Trappe, W., Zhang, Y., and Nath, B. 2005. Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 91--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lim, H., Kung, L., Hou, J., and Luo, H. 2006. Zero-configuration, robust indoor localization: Theory and experimentation. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  18. Liu, D., Ning, P., and Du, W. 2005. Attack-resistant location estimation in sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 99--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Madigan, D., Elnahrawy, E., Martin, R., Ju, W., Krishnan, P., and Krishnakumar, A. S. 2005. Bayesian indoor positioning systems. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 324--331.Google ScholarGoogle Scholar
  20. Niculescu, D. and Nath, B. 2001. Ad hoc positioning system (APS). In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2926--2931.Google ScholarGoogle Scholar
  21. Priyantha, N., Chakraborty, A., and Balakrishnan, H. 2000. The cricket location-support system. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom). 32--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Roos, T., Myllymaki, P., and Tirri, H. 2002. A statistical modeling approach to location estimation. IEEE Trans. Mobile Comput. 1, 1 (Jan--March), 59--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sastry, N., Shankar, U., and Wagner, D. 2003. Secure verification of location claims. In Proceedings of the ACM Workshop on Wireless Security. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Savvides, A., Han, C.-C., and Srivastava, M. 2001. Dynamic fine-grained localization in ad hoc networks of sensors. In Proceedings of the Seventh Annual ACM International Conference on Mobile Computing and Networking (MobiCom). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shang, Y., Ruml, W., Zhang, Y., and Fromherz, M. P. J. 2003. Localization from mere connectivity. In Proceedings of the Fourth ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc). 201--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Tao, P. and Rudys, A., and Ladd, A. and Wallach, D. 2003. Wireless lan location-sensing for security applications. In Proceedings of the Second ACM Workshop on Wireless Security (WiSe). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wilson, R. 2002. Propagation loss through common building materials, 2.4GHz vs. 5GHz. White paper available at http://www.magisnetworks.com.Google ScholarGoogle Scholar
  28. Youssef, M., Agrawal, A., and Shankar, A. U. 2003. WLAN location determination via clustering and probability distributions. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). 143--150. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A security and robustness performance analysis of localization algorithms to signal strength attacks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 5, Issue 1
        February 2009
        307 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/1464420
        Issue’s Table of Contents

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 February 2009
        • Accepted: 1 December 2007
        • Revised: 1 May 2007
        • Received: 1 September 2006
        Published in tosn Volume 5, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader