Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach

被引:15
作者
Li, Weiwei [1 ]
Su, Zhou [1 ]
Zhang, Kuan [2 ]
Benslimane, Abderrahim [3 ]
Fang, Dongfeng [4 ]
机构
[1] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
[2] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Lincoln, NE 68588 USA
[3] Univ Avignon, Comp Sci & Engn, F-84029 Avignon, France
[4] Calif Polytech State Univ San Luis Obispo, Dept Comp Sci & Software Engn, San Luis Obispo, CA 93407 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2020年 / 7卷 / 04期
关键词
Wireless fidelity; Robustness; Big Data; Feature extraction; Optimization; Data analysis; Mobile handsets; Fingerprint positioning; big data analytics; AP selection; crowd traffic evaluation; robustness; ALGORITHM; CLASSIFICATION; OPTIMIZATION; FRAMEWORK; MODEL; RSS;
D O I
10.1109/TNSE.2020.3014384
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The integration of WiFi fingerprint-based indoor positioning technology and big data analysis emerges as a new research prospect. Through the analysis of big data collected from users' submission, we can discover many other applications of fingerprint positioning. A popular application is the check-in to point of interest (POI) for its crowd traffic evaluation according to the volume of received signal strength (RSS) fingerprints submitted by users. However, this crowd traffic evaluation method may be susceptible to the intrusion of malicious check-in behaviors. Attackers who are not at the target POI submit the self-modification RSS fingerprints that can be located at the target POI in order to illegally increase its crowd traffic. To this end, we propose a malicious check-in defense scheme based on the access point (AP) selection to resist attackers who aim to successfully initiate the fingerprint modification. Specifically, the distance between different POIs in fingerprint space is firstly developed for AP selection. Then, in order to increase the robustness of selected AP subset, we propose the mutual information among different classes as a selection condition. Through the multiobjective optimization and Pareto optimality, we can obtain the best AP subset to participate in the computation of positioning algorithm. Furthermore, the optimal modified fingerprint is searched by the level set method (LSM), which can be utilized to measure the costs of attackers and the robustness of the system. In addition, we propose an iterative weight updating method based on classification error to learn the optimal weight in order to balance the positioning accuracy and robustness. We finally carry out extensive simulations to validate that the POI crowd traffic can be assessed in terms of the RSS fingerprint-related information and our proposed scheme can perform high robustness to resist malicious check-in.
引用
收藏
页码:2642 / 2655
页数:14
相关论文
共 52 条
[1]   Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm [J].
Ambusaidi, Mohammed A. ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Tan, Zhiyuan .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :2986-2998
[2]   Feature Selection for Effective Health Index Diagnoses of Power Transformers [J].
Benhmed, Kamel ;
Mooman, Abdelniser ;
Younes, Abdunnaser ;
Shaban, Khaled ;
El-Hag, Ayman .
IEEE TRANSACTIONS ON POWER DELIVERY, 2018, 33 (06) :3223-3226
[3]   Outdoor Places of Interest Recognition Using WiFi Fingerprints [J].
Bisio, Igor ;
Garibotto, Chiara ;
Lavagetto, Fabio ;
Sciarrone, Andrea .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :5076-5086
[4]   GPS/HPS-and Wi-Fi Fingerprint-Based Location Recognition for Check-In Applications Over Smartphones in Cloud-Based LBSs [J].
Bisio, Igor ;
Lavagetto, Fabio ;
Marchese, Mario ;
Sciarrone, Andrea .
IEEE TRANSACTIONS ON MULTIMEDIA, 2013, 15 (04) :858-869
[5]   Hybrid Framework Using Multiple-Filters and an Embedded Approach for an Efficient Selection and Classification of Microarray Data [J].
Bonilla-Huerta, Edmundo ;
Hernandez-Montiel, Alberto ;
Morales-Caporal, Roberto ;
Arjona-Lopez, Marco .
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2016, 13 (01) :12-26
[6]   Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services [J].
Chen, Jing ;
He, Kun ;
Yuan, Quan ;
Chen, Min ;
Du, Ruiying ;
Xiang, Yang .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (11) :2524-2535
[7]   Machine-Learning Indoor Localization with Access Point Selection and Signal Strength Reconstruction [J].
Cheng, Yen-Kai ;
Chou, Hsin-Jui ;
Chang, Ronald Y. .
2016 IEEE 83RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2016,
[8]   Sequential Learning Approach for Scaling Up Filter-Based Feature Subset Selection [J].
Ditzler, Gregory ;
Polikar, Robi ;
Rosen, Gail .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (06) :2530-2544
[9]   A Fine-Grained Indoor Location-Based Social Network [J].
Elhamshary, Moustafa ;
Basalamah, Anas ;
Youssef, Moustafa .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (05) :1203-1217
[10]   Received-Signal-Strength-Based Indoor Positioning Using Compressive Sensing [J].
Feng, Chen ;
Au, Wain Sy Anthea ;
Valaee, Shahrokh ;
Tan, Zhenhui .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (12) :1983-1993