Acknowledgement
Supported by : National Science Foundation
References
- G. Sun, J. Chen, W. Guo, and K. J. R. Liu, "Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs," IEEE Signal Process. Mag., vol. 22, no. 4, pp. 12-23, 2005.
- A. H. Sayed, A. Tarighat, and N. Khajehnouri, "Network-based wireless location: challenges faced in developing techniques for accurate wireless location information," IEEE Signal Process. Mag., vol. 22, no. 4, pp. 24-40, 2005.
- J. H. Lee and R. M. Buehrer, "Location estimation using differential RSS with spatially correlated shadowing," in Proc. IEEE GLOBECOM, 2009, pp. 4613-4618.
- D. Faria and D. Cheriton, "No long-term secrets: Location-based security in overprovisioned wireless LANs," in Proc. ACM Workshop on Hot Topics in Netw., vol. 1, Nov. 2004, pp. 212-222.
- R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Proc. IEEE GLOBECOM, vol. 4, 2004, pp. 2271-2275.
- L. Ma, A. Y. Teymorian, and X. Cheng, "A hybrid rogue access point protection framework for commodity Wi-Fi networks," in Proc. IEEE INFOCOM, 2008, pp. 1220-1228.
- J. Yang, Y. Chen, and W. Trappe, "Detecting sybil attacks in wireless and sensor networks using cluster analysis," in Proc. Int. Conf. Mobile Ad Hoc Sensor Syst., 2008, pp. 834-839.
- E. Bland. (2008, Oct.). GPS 'spoofing' could threaten national security. [Online]. Available: http://www.msnbc.msn.com/id/26992456
- B. M. Ledvina, M. L. Psiaki, S. P. Powell, and P. M. Kintner, "Bit-wise parallel algorithms for efficient software correlation applied to a GPS software receiver," IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1469- 1473, 2004. https://doi.org/10.1109/TWC.2004.833467
- N. O. Tippenhauer, K. B. Rasmussen, C. Popper, and S. Capkun, "iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems," SysSec Technical Report, ETH Zurich, Apr. 2008.
- Y. Chen, W. Trappe, and R. P. Martin, "Attack detection in wireless localization," in Proc. IEEE Conf. Comp. Commun., 2007, pp. 1964-1972.
- Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2418-2434, June 2010.
- S.-H. Fang, C.-C. Chuang, and C. Wang, "Attack-resistant wireless localization using an inclusive disjunction model," IEEE Trans. Commun., vol. 60, no. 5, pp. 1209-1214, June 2012.
- N. Sastry, N. U. Shankar, and D. Wagner, "Secure verification of location claims," in Proc. ACM Workshop on Wireless Secur., 2003, pp. 1-10.
- L. Lazos, P. Radha, and S. Capkun, "ROPE: robust position estimation in wireless sensor networks," in Proc. IEEE/ACM Int. Conf. Information Processing in Sensor Networks, 2005, pp. 324-331.
- S. Capkun and J. P. Hubaux, "Secure positioning in wireless networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 221-232, 2006.
- L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Trans. Sen. Netw., vol. 1, no. 1, pp. 73-100, 2005. https://doi.org/10.1145/1077391.1077395
- D. Liu, P. Ning, A. Liu, C. Wang, and W. Du, "Attack-resistant location estimation in wireless sensor networks," ACM Trans. Inf. Syst. Secur., vol. 11, no. 4, pp. 1-39, 2008.
- T. S. Rappapport, Wireless Communications: Principles and Practice. 2nd ed., New Jersey: Prentice-Hall, 2002.
- M. Gudmundson, "Correlation model for shadow fading in mobile radio systems," Electronics Lett., vol. 27, no. 23, pp. 2145-2146, 1991. https://doi.org/10.1049/el:19911328
- M. Patzold, N. Avazov, and V. D. Nguyen, "Design and simulation of measurement-based correlation models for shadow fading," REV J. Electronics and Commun., vol. 1, no. 2, pp. 80-87, Apr. 2011.
- Z. Wang, E. K. Tameh, and A. R. Nix, "Joint shadowing process in urban peer-to-peer radio channels," IEEE Trans. Veh. Technol., vol. 57, no. 1, pp. 52-64, Jan. 2008.
- S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. New Jersey: Prentice-Hall, 1993.
- S. D. Chitte, S. Dasgupta, and Z. Ding, "Distance estimation from received signal strength under log-normal shadowing: Bias and variance," IEEE Signal Process. Lett., vol. 16, no. 3, pp. 216-218, Mar. 2009.
- J. Kennedy and M. C. Sullivan, "Direction finding and "smart antennas" using software radio architectures," IEEE Commun. Mag., vol. 33, no. 5, pp. 62-68, 1995. https://doi.org/10.1109/35.392997
- P. Ioannides and C. A. Balanis, "Uniform circular arrays for smart antennas," IEEE Antennas Propag. Mag., vol. 47, no. 4, pp. 192-206, 2005.
- W. L. Stutzman and G. A. Thiele, Antenna Theory and Design. 2nd ed., New York: Wiley, 1998.
- G. Golub and C. Van Loan, Matrix Computations. 3rd ed., Baltimore: Johns Hopkins Univ. Press, 1996.
- V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, 2009.
- R. L. Graham, "An efficient algorithm for determining the convex hull of a finite planar set," Inf. Process. Lett., vol. 1, no. 4, pp. 132-133, 1972. https://doi.org/10.1016/0020-0190(72)90045-2
- M. A. Spirito, "On the accuracy of cellular mobile station location estimation," IEEE Trans. Veh. Technol., vol. 50. no. 3, pp. 674-685, 2001. https://doi.org/10.1109/25.933304
- S. M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory, vol. II. New Jersey: Prentice-Hall, 1998.
- E. B. Wilson, "First and second laws of error," J. American Statistical Assoc., vol. 18, no. 143, pp. 841-851, 1923. https://doi.org/10.1080/01621459.1923.10502116
- S. Slijepcevic, S. Megerian, and M. Potkonjak, "Characterization of location error in wireless sensor networks: analysis and applications," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2003, pp. 593-608.
- N. B. Priyantha, H. Balakrishnan, E. D. Demaine, and S. Teller, "Mobileassisted localization in wireless sensor networks," in Proc. IEEE Conf. Comp. Commun., vol. 1, 2005, pp. 172-183.
- R. A. Granger, Fluid Mechanics. New York: Holt, Rinehart, and Winston, 1985.