The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can

被引:0
|
作者
Bauer, Kevin [1 ]
McCoy, Damon [1 ]
Anderson, Eric [1 ]
Breitenbach, Markus [1 ]
Grudic, Greg [1 ]
Grunwald, Dirk [1 ]
Sicker, Douglas [1 ]
机构
[1] Univ Colorado, Boulder, CO 80309 USA
来源
GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8 | 2009年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show that these localization techniques are vulnerable to non-cryptographic attacks where an adversary uses a low-cost directional antenna to appear from the localization algorithm's perspective to be in another arbitrary location of their choosing. The attacker's ability to actively influence where they are positioned is a key distinguishing feature of the directional attack relative to prior localization attacks that use transmit power control to introduce localization errors. We implement a representative set of received signal strength-based localization algorithms and evaluate the attack in a real office building environment. To mitigate the attack's effectiveness, we develop and evaluate an attack detection scheme that offers a high detection rate with few false positives.
引用
收藏
页码:4125 / 4130
页数:6
相关论文
共 2 条
  • [1] All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack
    Kim, Yu Seung
    Mokaya, Frank
    Chen, Eric
    Tague, Patrick
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [2] Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets
    Chen, Weiteng
    Qian, Zhiyun
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1581 - 1598