Characterization and Detection of Location Spoofing Attacks

  • Lee, Jeong-Heon (Digital Media and Communications (DMC) Research Center, Samsung Electronics) ;
  • Buehrer, R. Michael (Bradley Department of Electrical and Computer Engineering, Virginia Tech)
  • Received : 2012.01.29
  • Published : 2012.08.31

Abstract

With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate through signal strength based attacks. Since the physical-layer approach identifies and assesses the security risk of position information based solely on using received signal strength (RSS), it is applicable to nearly any practical wireless network. In this paper, we characterize the impact of signal strength and beamforming attacks on range estimates and the resulting position estimate. It is shown that such attacks can be characterized by a scaling factor that biases the individual range estimators either uniformly or selectively. We then identify the more severe types of attacks, and develop an attack detection approach which does not rely on a priori knowledge (either statistical or environmental). The resulting approach, which exploits the dissimilar behavior of two RSS-based estimators when under attack, is shown to be effective at detecting both types of attacks with the detection rate increasing with the severity of the induced location error.

Keywords

Acknowledgement

Supported by : National Science Foundation

References

  1. G. Sun, J. Chen, W. Guo, and K. J. R. Liu, "Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs," IEEE Signal Process. Mag., vol. 22, no. 4, pp. 12-23, 2005.
  2. A. H. Sayed, A. Tarighat, and N. Khajehnouri, "Network-based wireless location: challenges faced in developing techniques for accurate wireless location information," IEEE Signal Process. Mag., vol. 22, no. 4, pp. 24-40, 2005.
  3. J. H. Lee and R. M. Buehrer, "Location estimation using differential RSS with spatially correlated shadowing," in Proc. IEEE GLOBECOM, 2009, pp. 4613-4618.
  4. D. Faria and D. Cheriton, "No long-term secrets: Location-based security in overprovisioned wireless LANs," in Proc. ACM Workshop on Hot Topics in Netw., vol. 1, Nov. 2004, pp. 212-222.
  5. R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Proc. IEEE GLOBECOM, vol. 4, 2004, pp. 2271-2275.
  6. L. Ma, A. Y. Teymorian, and X. Cheng, "A hybrid rogue access point protection framework for commodity Wi-Fi networks," in Proc. IEEE INFOCOM, 2008, pp. 1220-1228.
  7. J. Yang, Y. Chen, and W. Trappe, "Detecting sybil attacks in wireless and sensor networks using cluster analysis," in Proc. Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 834-839.
  8. E. Bland. (2008, Oct.). GPS 'spoofing' could threaten national security. [Online]. Available: http://www.msnbc.msn.com/id/26992456
  9. B. M. Ledvina, M. L. Psiaki, S. P. Powell, and P. M. Kintner, "Bit-wise parallel algorithms for efficient software correlation applied to a GPS software receiver," IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1469- 1473, 2004. https://doi.org/10.1109/TWC.2004.833467
  10. N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun, "iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems," SysSec Technical Report, ETH Zurich, Apr. 2008.
  11. Y. Chen, W. Trappe, and R. P. Martin, "Attack detection in wireless localization," in Proc. IEEE Conf. Comp. Commun., 2007, pp. 1964-1972.
  12. Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2418-2434, June 2010.
  13. S.-H. Fang, C.-C. Chuang, and C. Wang, "Attack-resistant wireless localization using an inclusive disjunction model," IEEE Trans. Commun., vol. 60, no. 5, pp. 1209-1214, June 2012.
  14. N. Sastry, N. U. Shankar, and D. Wagner, "Secure verification of location claims," in Proc. ACM Workshop on Wireless Secur., 2003, pp. 1-10.
  15. L. Lazos, P. Radha, and S. Capkun, "ROPE: robust position estimation in wireless sensor networks," in Proc. IEEE/ACM Int. Conf. Information Processing in Sensor Networks, 2005, pp. 324-331.
  16. S. Capkun and J. P. Hubaux, "Secure positioning in wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221-232, 2006.
  17. L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Trans. Sen. Netw., vol. 1, no. 1, pp. 73-100, 2005. https://doi.org/10.1145/1077391.1077395
  18. D. Liu, P. Ning, A. Liu, C. Wang, and W. Du, "Attack-resistant location estimation in wireless sensor networks," ACM Trans. Inf. Syst. Secur., vol. 11, no. 4, pp. 1-39, 2008.
  19. T. S. Rappapport, Wireless Communications: Principles and Practice. 2nd ed., New Jersey: Prentice-Hall, 2002.
  20. M. Gudmundson, "Correlation model for shadow fading in mobile radio systems," Electronics Lett., vol. 27, no. 23, pp. 2145-2146, 1991. https://doi.org/10.1049/el:19911328
  21. M. Patzold, N. Avazov, and V. D. Nguyen, "Design and simulation of measurement-based correlation models for shadow fading," REV J. Electronics and Commun., vol. 1, no. 2, pp. 80-87, Apr. 2011.
  22. Z. Wang, E. K. Tameh, and A. R. Nix, "Joint shadowing process in urban peer-to-peer radio channels," IEEE Trans. Veh. Technol., vol. 57, no. 1, pp. 52-64, Jan. 2008.
  23. S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. New Jersey: Prentice-Hall, 1993.
  24. S. D. Chitte, S. Dasgupta, and Z. Ding, "Distance estimation from received signal strength under log-normal shadowing: Bias and variance," IEEE Signal Process. Lett., vol. 16, no. 3, pp. 216-218, Mar. 2009.
  25. J. Kennedy and M. C. Sullivan, "Direction finding and "smart antennas" using software radio architectures," IEEE Commun. Mag., vol. 33, no. 5, pp. 62-68, 1995. https://doi.org/10.1109/35.392997
  26. P. Ioannides and C. A. Balanis, "Uniform circular arrays for smart antennas," IEEE Antennas Propag. Mag., vol. 47, no. 4, pp. 192-206, 2005.
  27. W. L. Stutzman and G. A. Thiele, Antenna Theory and Design. 2nd ed., New York: Wiley, 1998.
  28. G. Golub and C. Van Loan, Matrix Computations. 3rd ed., Baltimore: Johns Hopkins Univ. Press, 1996.
  29. V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, 2009.
  30. R. L. Graham, "An efficient algorithm for determining the convex hull of a finite planar set," Inf. Process. Lett., vol. 1, no. 4, pp. 132-133, 1972. https://doi.org/10.1016/0020-0190(72)90045-2
  31. M. A. Spirito, "On the accuracy of cellular mobile station location estimation," IEEE Trans. Veh. Technol., vol. 50. no. 3, pp. 674-685, 2001. https://doi.org/10.1109/25.933304
  32. S. M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory, vol. II. New Jersey: Prentice-Hall, 1998.
  33. E. B. Wilson, "First and second laws of error," J. American Statistical Assoc., vol. 18, no. 143, pp. 841-851, 1923. https://doi.org/10.1080/01621459.1923.10502116
  34. S. Slijepcevic, S. Megerian, and M. Potkonjak, "Characterization of location error in wireless sensor networks: analysis and applications," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2003, pp. 593-608.
  35. N. B. Priyantha, H. Balakrishnan, E. D. Demaine, and S. Teller, "Mobileassisted localization in wireless sensor networks," in Proc. IEEE Conf. Comp. Commun., vol. 1, 2005, pp. 172-183.
  36. R. A. Granger, Fluid Mechanics. New York: Holt, Rinehart, and Winston, 1985.