Anomalous Path Detection for Spatial Crowdsourcing-based Indoor Navigation System

被引:0
作者
Li, Weiwei [1 ]
Zhang, Kuan [2 ]
Su, Zhou [1 ]
Lu, Rongxing [3 ]
Wang, Ying [4 ]
机构
[1] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai, Peoples R China
[2] Univ Nebraska, Dept Elect & Comp Engn, Lincoln, NE USA
[3] Univ New Brunswick, Fac Comp Sci, Fredericton, NB, Canada
[4] Beijing Univ Posts & Telecommun, Wireless Technol Innovat Inst, Beijing, Peoples R China
来源
2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Anomalous path detection; Reputation; Trajectory sequence; INTERNET;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Indoor navigation system provides customized path planning for requesters who are unfamiliar with the indoor environment, such as shopping mall and airport. Spatial crowdsourcing technology can be applied to indoor navigation to offer fundamental services related to location. However, spatial crowdsourcing-based indoor navigation is vulnerable to the intrusion of injected anomalous paths from attackers. In this paper, we propose an anomalous path detection (APD) scheme to classify attackers according to their reputation management and abnormal trajectory sequence. Specifically, we first develop a crowdsourcing system to support the indoor location service using the fog as the spatial crowdsourcing server. Then, we identify two levels of attackers, i.e., the malicious responders and the semi-honest responders in the indoor environment according to their attacking purposes. Through the responders' historical records from the fog server, we analyze a series of trajectory sequences consisting of the distance between the current position and the destination to distinguish the semi-honest responders from the normal. In addition, we propose a semi-supervised learning with hidden Markov model (HMM) to detect the semi-honest responders. Finally, the extensive simulations show that the APD scheme can achieve higher accuracy with the acceptable false rate.
引用
收藏
页数:6
相关论文
共 22 条
  • [1] [Anonymous], 2006, Proceedings of the 12th international conference on Knowledge discovery and data mining
  • [2] [Anonymous], P 21 ACM SIGSP INT C
  • [3] Balan R.K., 2011, Proceedings from MobiSys '11: The 9th international conference on Mobile systems, applications, and services, P99
  • [4] Bu YY, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P159
  • [5] iBOAT: Isolation-Based Online Anomalous Trajectory Detection
    Chen, Chao
    Zhang, Daqing
    Castro, Pablo Samuel
    Li, Nan
    Sun, Lin
    Li, Shijian
    Wang, Zonghui
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (02) : 806 - 818
  • [6] DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs
    Chen, Kang
    Shen, Haiying
    Yan, Li
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (01) : 121 - 136
  • [7] A Survey of Indoor Positioning Systems for Wireless Personal Networks
    Gu, Yanying
    Lo, Anthony
    Niemegeers, Ignas
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 13 - 32
  • [8] Kuan Zhang, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P271, DOI 10.1109/INFOCOM.2015.7218391
  • [9] Trajectory outlier detection: A partition-and-detect framework
    Lee, Jae-Gil
    Han, Jiawei
    Li, Xiaolei
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 140 - +
  • [10] Li XL, 2007, PROCEEDINGS OF THE SEVENTH SIAM INTERNATIONAL CONFERENCE ON DATA MINING, P273