DOI QR코드

DOI QR Code

Attack-Resistant Received Signal Strength based Compressive Sensing Wireless Localization

  • Yan, Jun (College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications) ;
  • Yu, Kegen (School of Geodesy & Geomatics and Collaborative Innovation Center for Geospatial Technology Wuhan University) ;
  • Cao, Yangqin (College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications) ;
  • Chen, Liang (State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing Wuhan University)
  • Received : 2016.11.28
  • Accepted : 2017.05.25
  • Published : 2017.09.30

Abstract

In this paper a three-phase secure compressive sensing (CS) and received signal strength (RSS) based target localization approach is proposed to mitigate the effect of malicious node attack. RSS measurements are first arranged into a group of subsets where the same measurement can be included in multiple subsets. Intermediate target position estimates are then produced using individual subsets of RSS measurements and the CS technique. From the intermediate position estimates, the residual error vector and residual error square vector are formed. The least median of residual error square is utilized to define a verifier parameter. The selected residual error vector is utilized along with a threshold to determine whether a node or measurement is under attack. The final target positions are estimated by using only the attack-free measurements and the CS technique. Further, theoretical analysis is performed for parameter selection and computational complexity evaluation. Extensive simulation studies are carried out to demonstrate the advantage of the proposed CS-based secure localization approach over the existing algorithms.

Keywords

Acknowledgement

Supported by : National Natural Science Foundation of China

References

  1. T.V. Nguyen, Y. Jeong, H. Shin, and M.Z. Win, "Least square cooperative localization," IEEE Trans. Vehicular Technology vol. 64, no. 4, pp.1318-1330, 2015. https://doi.org/10.1109/TVT.2015.2398874
  2. S.H. Li, M. Hedley, and I.B. Collings, "New efficient indoor cooperative localization algorithm with empirical ranging error model," IEEE Journal on Selected Areas in Communications, vol. 33, no. 7, pp. 1407-1417, 2015. https://doi.org/10.1109/JSAC.2015.2430273
  3. I. Sabek, M. Youssef, and A.V. Vasilakos, "ACE: an accurate and efficient multi-entity device-free WLAN localization system," IEEE Trans. Mobile Computing, vol. 14, no. 2, pp. 261-273, 2015. https://doi.org/10.1109/TMC.2014.2320265
  4. I. Sharp and K. Yu, "Indoor TOA error measurement, modeling and analysis for indoor positioning," IEEE Trans. Instrumentation and measurement, vol. 63, no. 9, pp. 2129-2144, 2014. https://doi.org/10.1109/TIM.2014.2308995
  5. I. Sharp and K. Yu, "Enhanced least squares algorithms for indoor positioning," IEEE Trans. Mobile Computing, vol. 12, no. 8, pp. 1640-1650, 2013. https://doi.org/10.1109/TMC.2012.124
  6. L. Chen, L. Pei, H. Kuusniemi, Y. Chen, T. Kroger and R. Chen. "Bayesian Fusion for Indoor Positioning Using Bluetooth Fingerprints," Wireless Personal Communications, vol. 70, no. 4, pp. 1735-1745, 2013. https://doi.org/10.1007/s11277-012-0777-1
  7. A.H. Sayed, A. Tarighat, N. Khajehnouri, "Network-based wireless location: challenges faced in developing techniques for accurate wireless location information," IEEE Signal Processing Magazines, vol. 22, no. 4, pp. 24-40, 2005. https://doi.org/10.1109/MSP.2005.1458275
  8. F. Bandiera, A. Coluccia, and G. Ricci, "A cognitive algorithm for received signal strength based localization," IEEE Trans. Signal Processing, vol. 63, no. 7, pp. 1726-1736, 2015. https://doi.org/10.1109/TSP.2015.2398839
  9. L. Chen, O. Julien, P. Thevenon, D. Serant and H. Kuusniemi, "TOA Estimation for Positioning with DVB-T Signals in Outdoor Static Tests," IEEE Transactions on Broadcasting, vol. 61, no. 4, pp. 33-38, 2015.
  10. Y.T. Chan, W.Y. Tsui, H.C. So, and P.C. Ching, "Time-of-arrival based localization under NLOS conditions," IEEE Trans. Veh. Technol. Vol. 55, no. 1, pp. 17-27, 2006. https://doi.org/10.1109/TVT.2005.861207
  11. K. Yu, I. Sharp, and Y.J. Guo, "Ground-Based Wireless Positioning," Wiley-IEEE Press, 2009.
  12. S. Gezici, "A survey on wireless position estimation," Wireless Personal Commun., vol. 44, no. 3, pp. 263-282, 2008. https://doi.org/10.1007/s11277-007-9375-z
  13. M.K. Oh and J.Y. Kim, "Ranging implementation for IEEE 802.15.4a IR-UWB systems," in Proc of IEEE Veh. Technol. Conf. (VTC), Singapore May 11-14, pp. 1077-1081, 2008.
  14. T. Rappaport, "Wireless Communications: Principles and Practice," IEEE Press Piscataway, NJ, USA.1996.
  15. D. Milioris, L. Kriara, A. Papakonstantinou, G. Tzagkarakis, P. Tsakalides, and M. Papadopouli, "Empirical evaluation of signal-strength fingerprint positioning in wireless LANs," in Proc.of 13th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Bodrum, Turkey, Oct. 2010.
  16. C. Feng, W.S.A. Au, S. Valaee, and Z. Tan, "Received-signal-strength-based indoor positioning using compressive sensing," IEEE Transactions on Mobile Computing, vol. 11, no. 12, pp. 1983-1993, 2012. https://doi.org/10.1109/TMC.2011.216
  17. A.W.S. Au, C. Feng, S. Valaee, S. Reyes, S. Sorour, S.N. Markowitz, D. Gold, K. Gordon, and M. Eizenman, "Indoor tracking and navigation using received signal strength and compressive sensing on a mobile device," IEEE Trans. Mobile Computing, vol. 12, no. 10, pp. 2050-2062, 2013. https://doi.org/10.1109/TMC.2012.175
  18. A. Boukerche, H.A.B. Oliveira, E.F. Nakamura, and A.A.F. Loureiro, "Secure localization algorithms for wireless sensor networks," IEEE Communications Magazine, pp. 96-101, 2008.
  19. L. Lazos and R. Poovendran, "Hirloc: high-resolution robust localization for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 233-246, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861381
  20. L. Lazos and R. Poovendran, "Serloc: secure range-independent localization for wireless sensor networks," in Proc.of ACM Workshop on Wireless Security (WiSe), pp. 21-30, 2004.
  21. L. Lazos, R. Poovendran, S. Capkun, "Rope: robust position estimation in wireless sensor networks," in Proc. of Fourth International Symposium on Information Processing in Sensor Networks (IPSN), pp. 324-331, Apr. 2005.
  22. W. Yuan, N. Wu, B. Etzlinger, H. Wang, J. Kuang, "Cooperative joint localization and clock synchronization based on gaussian message passing in asynchronous wireless networks," IEEE Trans. Vehicular Technology, vol. 65, no. 9, pp. 7258-7273, 2016. https://doi.org/10.1109/TVT.2016.2518185
  23. N. Wu, Y. Xiong, H. Wang, J. Kuang, "A performance limit of TOA-based location-aware wireless networks with ranging outliers," IEEE Communications. Letters, vol. 19, no. 8, pp. 1414-1417, 2015. https://doi.org/10.1109/LCOMM.2015.2447543
  24. M. Jadliwala, S. Zhong, S. Upadhyaya, C. Qiao, and J.P. Hubaux, "Secure distance-based localization in the presence of cheating beacon nodes," IEEE Trans. Mobile Computing, vol. 9, no. 6, pp. 810-823, 2010. https://doi.org/10.1109/TMC.2010.20
  25. R. Garg, A. Varna, and M. Wu, "An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks," IEEE Trans. Information Forensics and Security, Vol. 7, No. 2, pp. 717-730, 2012. https://doi.org/10.1109/TIFS.2012.2184094
  26. S. Capkun and J.P. Hubaux, "Secure positioning in wireless networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 221-232, 2006. https://doi.org/10.1109/JSAC.2005.861380
  27. Z. Li,W. Trappe, Y. Zhang, B. Nath, "Robust statistical methods for securing wireless localization in sensor networks," in Proc. of Fourth International Symposium on Information Processing in Sensor Networks (IPSN), pp. 91-98, 2005.
  28. S.H. Fang, C.C. Chuang, and C. Wang, "Attack-resistant wireless localization using an inclusive disjunction model," IEEE Trans. Communications, vol. 60, no. 5, pp. 1209-1214, 2012. https://doi.org/10.1109/TCOMM.2012.040212.100291
  29. V. Cevher, P. Boufounos, R.G. Baraniuk, A.C. Gilbert, and M.J. Strauss, " Near-optimal Bayesian localization via incoherence and sparsity," in Proc. of 2009 International Conference on Information Processing in Sensor Networks (IPSN'2009), pp. 205-216, 2009.
  30. J.C. Emmanuel and B.W. Michael, "An introduction to compressive sampling," IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 21-30, 2008. https://doi.org/10.1109/MSP.2007.914731
  31. S. Nikitaki and P. Tsakalides, "Localization in wireless networks via spatial sparsity," in Proc. of the Forty Fourth Asilomar Conference on Signals, Systems, and Computers (ASILOMAR), pp. 236-239, Nov. 2010.
  32. J. Wang, D. Fang, X. Chen, Z. Yang, T. Xing, and L. Cai, "LCS: Compressive sensing based device-free localization for multiple targets in sensor networks," in Proc. of IEEE INFOCOM, pp 145-149, 2013.
  33. D. Milioris, G. Tzagkarakis, A. Papakonstantinou, M. Papadopouli, and P. Tsakalides, "Low-dimensional signal-strength fingerprint-based positioning in wireless LANs," Ad Hoc Networks, vol. 12, pp. 100-114, 2014. https://doi.org/10.1016/j.adhoc.2011.12.006
  34. J. Deng, Q. Cui, and X. Zhang, "Data pre-processing in compressive sensing based indoor fingerprinting positioning," International Journal of Wireless Information Networks, vol. 20, pp. 256-267, 2013. https://doi.org/10.1007/s10776-013-0226-4
  35. D. Liu, P. Ning, and W.K. Du, "Attack-resistant location estimation in sensor networks," in Proc. of Fourth International Symposium on Information Processing in Sensor Networks (IPSN), pp. 99-106, 2005.
  36. X.Y. Li, Y.Y. Chen, J. Yang, and X.Y. Zheng, "Designing localization algorithms robust to signal strength attacks," in Proc. of IEEE International Conference on Computer Communications (Infocom), pp. 341-345, 2011.
  37. N. Patwari, J.N. Ash, S. Kyperountas, A.O. Hero, R.L. Moses, and N.S. Correal, "Locating the nodes: cooperative localization in wireless sensor networks," IEEE Signal Processing Magazine, vol. 22, no. 4, pp. 54-69, 2005. https://doi.org/10.1109/MSP.2005.1458287
  38. Y.Y. Chen, K. Kleisouris, X.Y. Li, W. Trappe, and R.P. Martin, "A security and robustness performance analysis of localization algorithms to signal strength attacks," ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-36, Feb. 2009.
  39. Y. Eldar and G. Kutyniok, "Compressed sensing: Theory and Applications," 1st Edition, Cambridge University Press, 2012.
  40. J.A. Tropp and A.C. Gilbert, "Signal recovery from random measurements via orthogonal matching pursuit," IEEE Trans. Information Theory, vol. 53, no. 12, pp. 4655-4666, Dec. 2007. https://doi.org/10.1109/TIT.2007.909108
  41. S.S. Chen, D.L. Donoho, and M.A. Saunders, "Atomic decomposition by basis pursuit," SIAM Journal on Scientific Computing, vol. 20, no. 1, pp. 33-61, 1998. https://doi.org/10.1137/S1064827596304010
  42. J.K. Pant, "Compressive sensing using lp optimization, Dissertation," University of Victoria, Canada, 2012.