A Security and Robustness Performance Analysis of Localization Algorithms to Signal Strength Attacks

被引:28
作者
Chen, Yingying [1 ]
Kleisouris, Konstantinos [2 ]
Li, Xiaoyan [3 ]
Trappe, Wade [2 ]
Martin, Richard P. [2 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] Rutgers State Univ, Piscataway, NJ USA
[3] Lafayette Coll, Easton, PA 18042 USA
关键词
Security; Performance; Algorithms; Design; Measurement; Experimentation; Localization; robustness; sensor networks; signal strength attacks; susceptibility;
D O I
10.1145/1464420.1464422
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Holder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Holder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.
引用
收藏
页数:37
相关论文
共 28 条
[1]  
[Anonymous], P WORKSH THEOR APPL
[2]  
[Anonymous], P 3 ANN IEEE COMM SO
[3]  
[Anonymous], DIT02086 U TRENT INF
[4]  
[Anonymous], P IEEE INFOCOM MAR
[5]  
[Anonymous], P INT C DISTR COMP S
[6]  
[Anonymous], 1993, Real and Functional Analysis
[7]  
[Anonymous], 2006, INIEEE INFOCOMM
[8]  
Bahl P., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P775, DOI 10.1109/INFCOM.2000.832252
[9]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[10]  
Capkun S., 2006, P IEEE INT C COMP CO