TY - GEN
T1 - Robust wireless localization to attacks on access points
AU - Yang, Jie
AU - Chen, Yingying
AU - Lawrence, Victor B.
AU - Swaminathan, Venkataraman
PY - 2009
Y1 - 2009
N2 - Trustworthy location information is important because it is a critical input to a wide variety of locationbased applications. However, the localization infrastructure is vulnerable to physical attacks and consequently the localization results are affected. In this paper, we focus on achieving robust wireless localization when attacks are present on access points. We first investigate the effects of attacks on localization. We then derive an attack-resistant scheme that can be integrated with existing localization algorithms and are not algorithmspecific. Our attack-resistant scheme are based on K-means clustering analysis. We examined our approach using received signal strength (RSS) in widely used lateration-based algorithms. We validated our method in the ORBIT testbed with an IEEE 802.11 (Wi-Fi) network. Our experimental results demonstrate that our proposed approach can achieve comparable localization performance when under access-point attacks as compared to normal situations without attack.
AB - Trustworthy location information is important because it is a critical input to a wide variety of locationbased applications. However, the localization infrastructure is vulnerable to physical attacks and consequently the localization results are affected. In this paper, we focus on achieving robust wireless localization when attacks are present on access points. We first investigate the effects of attacks on localization. We then derive an attack-resistant scheme that can be integrated with existing localization algorithms and are not algorithmspecific. Our attack-resistant scheme are based on K-means clustering analysis. We examined our approach using received signal strength (RSS) in widely used lateration-based algorithms. We validated our method in the ORBIT testbed with an IEEE 802.11 (Wi-Fi) network. Our experimental results demonstrate that our proposed approach can achieve comparable localization performance when under access-point attacks as compared to normal situations without attack.
UR - http://www.scopus.com/inward/record.url?scp=67650676869&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=67650676869&partnerID=8YFLogxK
U2 - 10.1109/SARNOF.2009.4850372
DO - 10.1109/SARNOF.2009.4850372
M3 - Conference contribution
AN - SCOPUS:67650676869
SN - 9781424433827
T3 - 2009 IEEE Sarnoff Symposium, SARNOFF 2009 - Conference Proceedings
BT - 2009 IEEE Sarnoff Symposium, SARNOFF 2009 - Conference Proceedings
T2 - 2009 IEEE Sarnoff Symposium, SARNOFF 2009
Y2 - 30 March 2009 through 1 April 2009
ER -