Skip to main content
Log in

Achieving robust wireless localization resilient to signal strength attacks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Received signal strength (RSS) based algorithms have been very attractive for localization since they allow the reuse of existing communication infrastructure and are applicable to many commodity radio technologies. Such algorithms, however, are sensitive to a set of non-cryptographic attacks, where the physical measurement process itself can be corrupted by adversaries. For example, the attacker can perform signal strength attacks by placing an absorbing or reflecting material around a wireless device to modify its RSS readings. In this work, we first formulate the all-around signal strength attacks, where similar attacks are launched towards all landmarks, and experimentally show the feasibility of launching such attacks. We then propose a general principle for designing RSS-based algorithms so that they are robust to all-around signal strength attacks. To evaluate our approach, we adapt a set of representative RSS-based localization algorithms according to our principle. We experiment with both simulated attacks and two sets of real attack scenarios. All the experiments show that our design principle can be applied to a wide spectrum of algorithms to achieve comparable performance with much better robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bahl, P., & Padmanabhan, V. N. (2000). RADAR: An in-building RF-based user location and tracking system. In Proceedings of the annual joint conference of the IEEE computer and communications societies (INFOCOM).

  2. Battiti, R., Brunato, M., & Villani, A. (2002). Statistical learning theory for location fingerprinting in wireless LANs. Technical Report DIT-02-086, University of Trento, Informatica e Telecomunicazioni.

  3. Brands, S., & Chaum, D. (1994). Distance-bounding protocols. In Proceedings of the workshop on the theory and application of cryptographic techniques on advances in cryptology (pp. 344–359).

  4. Capkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM).

  5. Chen, Y., Chandrasekaran, G., Elnahrawy, E., Francisco, J., Kleisouris, K., Li, X., et al. (2008). GRAIL: A general purpose localization system. Sensor review, special edition. Localisation Systems, 28(2), 115–124.

    Google Scholar 

  6. Chen, Y., Kleisouris, K., Li, X., Trappe, W., & Martin, R. P. (2009). A security and robustness performance analysis of localization algorithms to signal strength attacks. ACM Transactions on Sensor Networks, 5(1), 1–37.

    Article  Google Scholar 

  7. Elnahrawy, E., Li, X., & Martin, R. P. (2004). The limits of localization using signal strength: A comparative study. In Proceedings of IEEE international conference on sensor and ad hoc communications and networks (SECON’04). Santa Clara, CA.

  8. Enge, P., & Misra, P. (2001). Global positioning system: Signals, measurements and performance. Lincoln, MA: Ganga-Jamuna Press.

    Google Scholar 

  9. Hossain, A. K. M. M., & Soh, W. S. (2010). Cramer-rao bound analysis of localization using signal strength difference as location fingerprint. In Proceedings of IEEE international conference on computer communications (INFOCOM).

  10. Hossain, A., Van, H., Jin, Y., & Soh, W. (2007). Indoor localization using multiple wireless technologies. In Proceedings of the IEEE MASS (pp. 1–8).

  11. http://mathworld.wolfram.com/ApolloniusCircle.html: Apollonius Circle.

  12. Krishnan, P., Krishnakumar, A. S., Ju, W. H., Mallows, C., & Ganu, S. (2004) A system for LEASE: Location estimation assisted by stationary emitters for indoor RF wireless networks. In Proceedings of the annual joint conference of the IEEE computer and communications societies (INFOCOM).

  13. Ladd, A. M., Bekris, K. E., Rudys, A., Marceau, G., Kavraki, L. E., & Wallach, D. S. (2002). Robotics-based location sensing using wireless ethernet. In Proceedings of the eighth ACM international conference on mobile computing and networking (MOBICOM).

  14. Langendoen, K., & Reijers, N. (2003). Distributed localization in wireless sensor networks: A quantitative comparison. Computer Networks, 43(4), 499–518.

    Article  MATH  Google Scholar 

  15. Lazos, L., Poovendran, R., & Capkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the fourth international symposium on information processing in sensor networks (IPSN) (pp. 324–331).

  16. Lee, J., Cho, K., Lee, S., Kwon, T., & Choi, Y. (2006). Distributed and energy-efficient target localization and tracking in wireless sensor networks. Elsevier Computer Communications, 29, 2494–2505.

    Google Scholar 

  17. Li, D., Wong, K., Hu, Y. H., & Sayeed, A. M. (2002). Detection, classification, tracking of targets in micro-sensor networks. IEEE Signal Processing Magazine, 19, 1163–1171.

    Google Scholar 

  18. Li, X. (2009). Ratio-based zero-profiling indoor localization. In Proceedings of the 6th IEEE international conference on mobile ad-hoc and sensor systems (MASS).

  19. Li, X., Chen, Y., Yang, J., & Zheng, X. (2011). Designing localization algorithms robust to signal strength attacks. In Proceedings of IEEE international conference on computer communications (INFOCOM), mini-conference.

  20. Li, Z., Trappe, W., Zhang, Y., & Nath, B. (2005). Robust statistical methods for securing wireless localization in sensor networks. In Proceedings of the fourth international symposium on information processing in sensor networks (IPSN).

  21. Liu, D., Ning, P., & Du, W. (2005). Attack-resistant location estimation in sensor networks. In Proceedings of the fourth international symposium on information processing in sensor networks (IPSN).

  22. Madigan, D., Elnahrawy, E., Martin, R. P., Ju, W. H., Krishnan, P., & Krishnakumar, A. S. (2005). Bayesian indoor positioning systems. In Proceedings of the annual joint conference of the IEEE computer and communications societies (INFOCOM).

  23. Niculescu, D., & Nath, B. (2001). Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM'01 (pp. 2926–2931).

  24. Priyantha, N., Chakraborty, A., & Balakrishnan, H. (2000). The cricket location-support system. In Proceedings of ACM international conference on mobile computing and networking (MobiCom).

  25. Roos, T., Myllymaki, P., & Tirri, H. (2002). A statistical modeling approach to location estimation. IEEE Transactions on Mobile Computing, 1(1), 59–69.

    Article  Google Scholar 

  26. Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the ACM workshop on wireless security.

  27. Seidel, S. Y., & Rappaport, T. S. (1992). 914 MHz path loss prediction models for indoor wireless communications in multifloored buildings. IEEE Transactions on Antennas and Propagation, 40(2), 207–217.

    Article  Google Scholar 

  28. Want, R., Hopper, A., Falcao, V., & Gibbons, J. (1992). The active badge location system. ACM Transactions on Information Systems, 10(1), 91–102.

    Article  Google Scholar 

  29. Yang, J., Chen, Y., Lawrence, V., & Swaminathan, V. (2009). Robust wireless localization to attacks on access points. In Sarnoff Symposium, 2009. SARNOFF ’09. IEEE (pp. 1–5). doi:10.1109/SARNOF.2009.4850372.

  30. Yang, S., Yi, J., & Cha, H. (2007). HCRL: A hop-count-ratio based localization in wireless sensor networks. In Proceedings of the fourth IEEE communications society conference on sensor, mesh, and ad hoc communications and networks (SECON).

  31. Youssef, M., Agrawal, A., & Shankar, A. U. (2003). WLAN location determination via clustering and probability distributions. In Proceedings of the first IEEE international conference on pervasive computing and communications (PerCom).

  32. Zhang, Y., Bhanage, G., Trappe, W., Zhang, Y., & Howard, R. (2007). Facilitating an active transmit-only RFID system through receiver-based processing. In Proceedings of the fourth annual IEEE communications society conference on sensor, mesh, and ad hoc communications and networks (SECON).

Download references

Acknowledgments

Preliminary results of this paper have been presented in part in IEEE INFOCOM mini-Conference 2011 [19]. The work was supported in part by National Science Foundation Grants CNS-0954020 and CCF-1018270.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoyan Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, X., Chen, Y., Yang, J. et al. Achieving robust wireless localization resilient to signal strength attacks. Wireless Netw 18, 45–58 (2012). https://doi.org/10.1007/s11276-011-0386-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-011-0386-z

Keywords

Navigation