Abstract
GPS-free outdoor localization becomes popular because of the expanding scale of WiFi deployments in metropolitan areas. As a substitution or complement to the Global Positioning System (GPS), WiFi localization systems provide very accurate results in WiFi-rich area. However, the current WiFi localization systems are not robust to WiFi external signal attack. In this study, we implement a reverse engineering model to decode the Android WiFi localization system output. With the aid of reverse engineering mode, we implement both static and dynamic external signal attacks to make the smartphone believing it is located in another location or moving along the attacker’s designed route using a portable programmed IoT device ESP8266. We also demonstrate that the WiFi based localization and navigation are vulnerable to external signal attacks by testing this attack on Android smartphone. Finally, we discuss the possible defense solutions and the future work. Our study indicates the smartphone is vulnerable to external signal attacks and there is an urgent need for defense solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wahlström, J., Skog, I., Händel, P.: Smartphone-based vehicle telematics: a ten-year anniversary. IEEE Trans. Intell. Transp. Syst. 18(10), 2802–2825 (2017)
Bell, S., Jung, W.R., Krishnakumar, V.: Wifi-based enhanced positioning systems: accuracy through mapping, calibration, and classification. In: Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness, pp. 3–9. ACM (2010)
Zeng, K.C., Shu, Y., Liu, S., Dou, Y., Yang, Y.: A practical gps location spoofing attack in road navigation scenario. In: Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, pp. 85–90 (2017)
Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., Čapkun, S.: Attacks on public wlan-based positioning systems. In: MobiSys. ACM, pp. 29–40 (2009)
Tippenhauer, N.O., Pöpper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful gps spoofing attacks. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 75–86. ACM (2011)
Paek, J., Kim, J., Govindan, R.: Energy-efficient rate-adaptive gps-based positioning for smartphones. In: MobiSys, pp. 299–314 (2010)
Alizadeh-Shabdiz, F., Jones, R.K., Morgan, E.J., Shean, M.G.: Location-based services that choose location algorithms based on number of detected access points within range of user device, 4 December 2007, uS Patent 7,305,245
Schmitz Weiss, A.: Exploring news apps and location-based services on the smartphone. Journalism Mass Commun. Quarterly 90(3), 435–456 (2013)
Zeng, K.C., Shu, Y., Liu, S., Dou, Y., Yang, Y.: A practical gps location spoofing attack in road navigation scenario. In: HotMobile. ACM, pp. 85–90 (2017)
Zeng, K.C., et al.: All your gps are belong to us: towards stealthy manipulation of road navigation systems. In: USENIX Security 2018 (2018)
Cao, Y., Luo, Q., Liu, J.: Road navigation system attacks: a case on gps navigation map. In: ICC 2019–2019 IEEE International Conference on Communications (ICC), pp. 1–5. IEEE (2019)
Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., Capkun, S.: iphone and ipod location spoofing: attacks on public wlan-based positioning systems," Technical report/ETH Zürich, Department of Computer Science, vol. 599 (2012)
Harvey, A.: Skylift (2017). https://github.com/adamhrv/skylift
Kumar, P., Duraimurugan, G., Kumar, G.M., Logesh, R., MyvizhiPraveen, L.: Prevention and localization of mac address spoofing attacks in wireless networks (2016)
Grokhotkov, I.: Esp8266 arduino core documentation. ESP8266 (2017)
Susiripala, A.: Load testing an esp8266 (2017). https://arunoda.me/blog/load-testing-an-esp8266
Larimer, J., Root, K.: Security and privacy in android apps. Google Developers (2012)
Russell, C.T.: Geophysical coordinate transformations. Cosmic Electrodynamics 2(2), 184–196 (1971)
Atanassov, K., Sotirov, S.: Index matrix interpretation of the multilayer perceptron. In: 2013 IEEE INISTA, pp. 1–3. IEEE (2013)
Rustamov, A., Gogoi, N., Minetto, A., Dovis, F.: Gnss anti-spoofing defense based on cooperative positioning. In: Proceedings of the 33rd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2020), pp. 3326–3337 (2020)
Soltanaghaei, E., Kalyanaraman, A., Whitehouse, K.: Multipath triangulation: decimeter-level wifi localization and orientation with a single unaided receiver. In: MobiSys, pp. 376–388 (2018)
Ye, A., Li, Q., Zhang, Q., Cheng, B.: Detection of spoofing attacks in wlan-based positioning systems using wifi hotspot tags. IEEE Access 8, 39 768–39 780 (2020)
Narain, S., Ranganathan, A., Noubir, G.: Security of gps/ins based on-road location tracking systems. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 587–601. IEEE (2019)
Acknowledgments
We appreciate constructive comments from anonymous reviewers. This work is supported by National Science Foundation (No 1553304).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hu, C., Liu, Y., Lu, Z., Zhao, S., Han, X., Xiong, J. (2021). Smartphone Location Spoofing Attack in Wireless Networks. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https://doi.org/10.1007/978-3-030-90022-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-90022-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90021-2
Online ISBN: 978-3-030-90022-9
eBook Packages: Computer ScienceComputer Science (R0)