Robust Wireless Localization: Attacks and Defenses
Y. Zhang, W. Trappe, Z. Li, M. Joglekar, and B. Nath. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer US, 10.1007/978-0-387-46276-9_6.(2007)
Abstract
Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to incorporate an additional layer in the data path to classify/clean the corrupted location data. To address these attacks, we outline a general framework for validating location information through data classification and data cleansing techniques. Consistency checking methods can be used to verify that physical measurements are consistent with each other and with physical reality. We then explore more powerful techniques that employ robust statistical methods to make localization schemes attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulation-based localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. We evaluate our robust localization schemes under different threat conditions.
%0 Book Section
%1 springerlink:10.1007/978-0-387-46276-9_6
%A Zhang, Yanyong
%A Trappe, Wade
%A Li, Zang
%A Joglekar, Manali
%A Nath, Badri
%B Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
%D 2007
%E Poovendran, Radha
%E Roy, Sumit
%E Wang, Cliff
%I Springer US
%K security wlanpos
%P 137-160
%T Robust Wireless Localization: Attacks and Defenses
%U http://dx.doi.org/10.1007/978-0-387-46276-9_6
%V 30
%X Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to incorporate an additional layer in the data path to classify/clean the corrupted location data. To address these attacks, we outline a general framework for validating location information through data classification and data cleansing techniques. Consistency checking methods can be used to verify that physical measurements are consistent with each other and with physical reality. We then explore more powerful techniques that employ robust statistical methods to make localization schemes attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulation-based localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. We evaluate our robust localization schemes under different threat conditions.
%@ 978-0-387-46276-9
@incollection{springerlink:10.1007/978-0-387-46276-9_6,
abstract = {Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to incorporate an additional layer in the data path to classify/clean the corrupted location data. To address these attacks, we outline a general framework for validating location information through data classification and data cleansing techniques. Consistency checking methods can be used to verify that physical measurements are consistent with each other and with physical reality. We then explore more powerful techniques that employ robust statistical methods to make localization schemes attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulation-based localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. We evaluate our robust localization schemes under different threat conditions.},
added-at = {2010-10-13T11:12:59.000+0200},
affiliation = {Rutgers University WINLAB USA},
author = {Zhang, Yanyong and Trappe, Wade and Li, Zang and Joglekar, Manali and Nath, Badri},
biburl = {https://www.bibsonomy.org/bibtex/28eaea5d0c1e6cfab4ced7e596bb24580/kw},
booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks},
editor = {Poovendran, Radha and Roy, Sumit and Wang, Cliff},
interhash = {7da61af5979f307ee3a11f47a7ffd536},
intrahash = {8eaea5d0c1e6cfab4ced7e596bb24580},
isbn = {978-0-387-46276-9},
keyword = {Computer Science},
keywords = {security wlanpos},
note = {10.1007/978-0-387-46276-9_6},
pages = {137-160},
publisher = {Springer US},
series = {Advances in Information Security},
timestamp = {2010-10-13T11:12:59.000+0200},
title = {Robust Wireless Localization: Attacks and Defenses},
url = {http://dx.doi.org/10.1007/978-0-387-46276-9_6},
volume = 30,
year = 2007
}