Skip to main content

Robust Wireless Localization: Attacks and Defenses

  • Conference paper

Part of the book series: Advances in Information Security ((ADIS,volume 30))

Abstract

Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather threats that adversely affect the ability of localization schemes to provide trustworthy location information. This paper identifies a list of attacks that are unique to localization algorithms. Since these attacks are diverse in nature, and there may be many unforseen attacks that can bypass traditional security countermeasures, it is desirable to incorporate an additional layer in the data path to classify/clean the corrupted location data. To address these attacks, we outline a general framework for validating location information through data classification and data cleansing techniques. Consistency checking methods can be used to verify that physical measurements are consistent with each other and with physical reality. We then explore more powerful techniques that employ robust statistical methods to make localization schemes attack-tolerant. We examine two broad classes of localization: triangulation and RF-based fingerprinting methods. For triangulation-based localization, we propose an adaptive least squares and least median squares position estimator that has the computational advantages of least squares in the absence of attacks and is capable of switching to a robust mode when being attacked. We introduce robustness to fingerprinting localization through the use of a median-based distance metric. We evaluate our robust localization schemes under different threat conditions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   229.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Langendoen and N. Reijers, “Distributed localization in wireless sensor networks: a quantitative comparison,” Comput. Networks, vol. 43, no. 4, pp. 499–518, 2003.

    Article  MATH  Google Scholar 

  2. N. Priyantha, A. Chakraborty, and H. Balakrishnan, “The CRICKET location-support system,” in Proceedings of the 6th annual international conference on Mobile computing and networking (Mobicom 2000), 2000, pp. 32–43.

    Google Scholar 

  3. D. Nicelescu and B. Nath, “Ad hoc positioning (APS) using AOA,” in Proceedings of IEEE Infocom 2003, 2003, pp. 1734–1743.

    Google Scholar 

  4. S. Capkun and J.P. Hubaux, “Secure positioning in sensor networks,” Technical report EPFL/IC/200444, May 2004.

    Google Scholar 

  5. L. Lazos and R. Poovendran, “SeRLoc: Secure range-independent localization for wireless sensor networks,” in Proceedings of the 2004 ACM Workshop on Wireless Security, 2004, pp. 21–30.

    Google Scholar 

  6. B. H. Wellenhoff, H. Lichtenegger, and J. Collins, Global Positions System: Theory and Practice, Fourth Edition, Springer Verlag, 1997.

    Google Scholar 

  7. A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, “The anatomy of a context-aware application,” in Proceedings of the MOBICOM 99, 1999.

    Google Scholar 

  8. A. Savvides, C. C. Han, and M. B. Srivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of the MOBICOM 01, 2001.

    Google Scholar 

  9. C. Savarese, K. Langendoen, and J. Rabaey, “Robust positioning algorithms for distributed ad-hoc wireless sensor networks,” in Proceedings of USENIX Technical Annual Conference, 2002.

    Google Scholar 

  10. D. Nicelescu and B. Nath, “DV based positioning in ad hoc networks,” Telecommunication Systems, vol. 22, no. 1–4, pp. 267–280, 2003.

    Article  Google Scholar 

  11. A. Savvides, H. Park, and M. Srivastava, “The bits and flops of the n-hop multilateration primitive for node localization problems,” in Proceedings of First ACM International Workshop on Wireless Sensor Networks and Application (WSNA), 2002, pp. 112–121.

    Google Scholar 

  12. J. Hightower, G. Boriello, and R. Want, “SpotON: An indoor 3D Location Sensing Technology Based on RF Signal Strength,” Tech. Rep. Technical Report 2000-02-02, University of Washington, February 2000.

    Google Scholar 

  13. N. Bulusu, J. Heidemann, and D. Estrin, “Gps-less low cost outdoor localization for very small devices,” IEEE Personal Communications Magazine, vol. 7, no. 5, pp. 28–34, 2000.

    Article  Google Scholar 

  14. M. Youssef, A. Agrawal, and A. U. Shankar, “WLAN location determination via clustering and probability distributions,” in Proceedings of IEEE PerCom’03, Fort Worth, TX, Mar. 2003.

    Google Scholar 

  15. T. Roos, P. Myllymaki, and H. Tirri, “A statistical modeling approach to location estimation,” IEEE Transactions on Mobile Computing, vol. 1, pp. 59–69, 2002.

    Article  Google Scholar 

  16. R. Battiti, M. Brunato, and A. Villani, “Statistical learning theory for location fingerprinting in wireless lans,” Technical Report DIT-02-086, University of Trento, Informatica e Telecomunicazioni, Oct. 2002.

    Google Scholar 

  17. P. Bahl and V.N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of IEEE Infocom 2000, 2000, pp. 775–784.

    Google Scholar 

  18. E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study,” in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communations and Networks (SECON 2004), Oct. 2004.

    Google Scholar 

  19. T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher, “Range-free localization schemes for large scale sensor networks,” in Proceedings of the 9th annual international conference on Mobile computing and networking (Mobicom 2003), 2003, pp. 81–95.

    Google Scholar 

  20. Y.C. Hu, A. Perrig, and D. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of IEEE Infocom 2003, 2003, pp. 1976–1986.

    Google Scholar 

  21. S. Brands and D. Chaum, “Distance-bounding protocols,” in Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, 1994, pp. 344–359.

    Google Scholar 

  22. N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proceedings of the 2003 ACM workshop on Wireless security, 2003, pp. 1–10.

    Google Scholar 

  23. S. Capkun and J. P. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2005.

    Google Scholar 

  24. L. Lazos, R. Poovendran, and S. Capkun, “Rope: robust position estimation in wireless sensor networks,” in Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), 2005, pp. 324–331.

    Google Scholar 

  25. S. Capkun and J.P. Hubaux, “Securing localization with hidden and mobile base stations,” to appear in Proceedings of IEEE Infocom 2006.

    Google Scholar 

  26. Z. Li, W. Trappe, Y. Zhang, and B. Nath, “Robust statistical methods for securing wireless localization in sensor networks,” in Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN 2005), 2005.

    Google Scholar 

  27. P. Bahl, V.N. Padmanabhan, and A. Balachandran, “Enhancements to the RADAR User Location and Tracking System,” Tech. Rep. Technical Report MSR-TR-2000-12, Microsoft Research, February 2000.

    Google Scholar 

  28. W. Starlings, Network Security Essentials, Applications and Standards, 2nd Edition, Prentice Hall, 2003.

    Google Scholar 

  29. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall, 1995.

    Google Scholar 

  30. W. Trappe and L.C. Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, 2002.

    Google Scholar 

  31. D. Niculescu and B. Nath, “VOR base stations for indoor 802.11 positioning,” in Proceedings of the Mobicom 2004, Philadelphia, PA, September 2004.

    Google Scholar 

  32. B. Przydatek, D. Song, and A. Perrig, “SIA: secure information aggregation in sensor networks,” in SenSys’ 03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003, pp. 255–265.

    Google Scholar 

  33. D. Wagner, “Resilient aggregation in sensor networks,” in SASN’ 04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004, pp. 78–87.

    Google Scholar 

  34. P. Rousseeuw and A. Leroy, “Robust regression and outlier detection,” Wiley-Interscience, September 2003.

    Google Scholar 

  35. A. Goldsmith, Wireless Communications, Cambridge University Press, to appear 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this paper

Cite this paper

Zhang, Y., Trappe, W., Li, Z., Joglekar, M., Nath, B. (2007). Robust Wireless Localization: Attacks and Defenses. In: Poovendran, R., Roy, S., Wang, C. (eds) Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security, vol 30. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-46276-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-46276-9_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32721-1

  • Online ISBN: 978-0-387-46276-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics