A security and robustness performance analysis of localization algorithms to signal strength attacks

Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where...

Full description

Saved in:
Bibliographic Details
Published inACM transactions on sensor networks Vol. 5; no. 1; pp. 1 - 37
Main Authors Chen, Yingying, Kleisouris, Konstantinos, Li, Xiaoyan, Trappe, Wade, Martin, Richard P.
Format Journal Article
LanguageEnglish
Published 01.02.2009
Online AccessGet full text
ISSN1550-4859
1550-4867
DOI10.1145/1464420.1464422

Cover

Abstract Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.
AbstractList Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.
Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Holder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Holder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm.
Author Kleisouris, Konstantinos
Trappe, Wade
Chen, Yingying
Martin, Richard P.
Li, Xiaoyan
Author_xml – sequence: 1
  givenname: Yingying
  surname: Chen
  fullname: Chen, Yingying
  organization: Stevens Institute of Technology, Hoboken, NJ
– sequence: 2
  givenname: Konstantinos
  surname: Kleisouris
  fullname: Kleisouris, Konstantinos
  organization: Rutgers University, Piscataway, NJ
– sequence: 3
  givenname: Xiaoyan
  surname: Li
  fullname: Li, Xiaoyan
  organization: Lafayette College, Easton, PA
– sequence: 4
  givenname: Wade
  surname: Trappe
  fullname: Trappe, Wade
  organization: Rutgers University, Piscataway, NJ
– sequence: 5
  givenname: Richard P.
  surname: Martin
  fullname: Martin, Richard P.
  organization: Rutgers University, Piscataway, NJ
BookMark eNp1kD1PwzAQhi0EEm1hZvXEFho7dhKPVcWXVIkF5shxzq3BjYvPGcqvJ7QVAxLTc6d7nxveKTnvQw-E3LD8jjEh50yUQvBxOZCfkQmTMs9EXVbnv7NUl2SK-J7nRSGKfEK6BUUwQ3RpT3Xf0RjaAVMPiHQH0Ya41b2B8aT9Hh3SYKkPRnv3pZMLPdV-HUZ5s0WaAkW3HoMUU4R-nTZUp6TNB16RC6s9wvWJM_L2cP-6fMpWL4_Py8UqM7ziKeO8NWUpmbIClAZlbGGYqgWHSlVVV-WsBW103RrFa2la2XWt5bYzANKyqihm5Pb4dxfD5wCYmq1DA97rHsKATSFKVbKyHIPzY9DEgBjBNrvotjruG5Y3P202pzZP5KMh_xjGpUMFKWrn__W-AetgfQg
CitedBy_id crossref_primary_10_1109_ACCESS_2016_2606486
crossref_primary_10_1371_journal_pone_0177326
crossref_primary_10_1002_sec_323
crossref_primary_10_1109_TPDS_2011_299
crossref_primary_10_1109_TCOMM_2012_040212_100291
crossref_primary_10_1007_s11276_011_0386_z
crossref_primary_10_1109_TVT_2014_2385814
crossref_primary_10_1088_1757_899X_383_1_012054
Cites_doi 10.1145/345910.345917
10.1145/778415.778439
10.1145/941311.941313
10.1109/INFCOM.2001.916662
10.1007/11776178_33
10.1145/381677.381693
10.1145/941311.941314
10.1109/TMC.2002.1011059
ContentType Journal Article
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1145/1464420.1464422
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1550-4867
EndPage 37
ExternalDocumentID 10_1145_1464420_1464422
GroupedDBID -DZ
.4S
.DC
23M
4.4
5GY
5VS
8US
AAKMM
AALFJ
AAYFX
AAYXX
ABPPZ
ACGFO
ACM
ADBCU
ADL
ADMLS
AEBYY
AEFXT
AEGXH
AEJOY
AENEX
AENSD
AFFNX
AFWIH
AFWXC
AIAGR
AIKLT
AKRVB
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BDXCO
CCLIF
CITATION
CS3
D0L
EBS
EDO
EJD
FEDTE
GUFHI
HF~
HGAVV
H~9
I07
LHSKQ
P1C
P2P
RNS
ROL
TUS
XOL
ZCA
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c272t-22bc66519f4e9ae9cf3c19842e7977d701beaca8bc9285cb5ddbf2fdcee5f1733
ISSN 1550-4859
IngestDate Fri Jul 11 15:20:41 EDT 2025
Wed Oct 01 05:53:47 EDT 2025
Thu Apr 24 23:00:54 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c272t-22bc66519f4e9ae9cf3c19842e7977d701beaca8bc9285cb5ddbf2fdcee5f1733
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 34696166
PQPubID 23500
PageCount 37
ParticipantIDs proquest_miscellaneous_34696166
crossref_primary_10_1145_1464420_1464422
crossref_citationtrail_10_1145_1464420_1464422
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2009-02-01
PublicationDateYYYYMMDD 2009-02-01
PublicationDate_xml – month: 02
  year: 2009
  text: 2009-02-01
  day: 01
PublicationDecade 2000
PublicationTitle ACM transactions on sensor networks
PublicationYear 2009
References Hu Y. (e_1_2_1_13_1)
Youssef M. (e_1_2_1_28_1)
Liu D. (e_1_2_1_18_1)
Niculescu D. (e_1_2_1_20_1)
Elnahrawy E. (e_1_2_1_9_1)
e_1_2_1_23_1
e_1_2_1_24_1
Chen Y. (e_1_2_1_6_1)
e_1_2_1_21_1
e_1_2_1_22_1
Capkun S. (e_1_2_1_4_1)
e_1_2_1_27_1
Lang S. (e_1_2_1_14_1)
e_1_2_1_25_1
e_1_2_1_26_1
Hightower J. (e_1_2_1_12_1) 2000
Battiti R. (e_1_2_1_2_1) 2002
Lim H. (e_1_2_1_17_1)
Brands S. (e_1_2_1_3_1)
Li Z. (e_1_2_1_16_1)
Madigan D. (e_1_2_1_19_1)
Lazos L. (e_1_2_1_15_1)
e_1_2_1_7_1
e_1_2_1_8_1
Bahl P. (e_1_2_1_1_1)
e_1_2_1_10_1
Hazas M. (e_1_2_1_11_1)
Capkun S. (e_1_2_1_5_1)
References_xml – ident: e_1_2_1_21_1
  doi: 10.1145/345910.345917
– volume-title: Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
  ident: e_1_2_1_6_1
– volume-title: Tech. Rep. DIT-02-086
  year: 2002
  ident: e_1_2_1_2_1
– volume-title: Real and Functional Analysis
  ident: e_1_2_1_14_1
– volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 324--331
  ident: e_1_2_1_15_1
– ident: e_1_2_1_25_1
  doi: 10.1145/778415.778439
– ident: e_1_2_1_27_1
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).
  ident: e_1_2_1_17_1
– volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 99--106
  ident: e_1_2_1_18_1
– volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 91--98
  ident: e_1_2_1_16_1
– volume-title: Spoton: An indoor 3d location sensing technology based on rf signal strength. Tech. Rep. 00-02-02
  year: 2000
  ident: e_1_2_1_12_1
– ident: e_1_2_1_23_1
  doi: 10.1145/941311.941313
– volume-title: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). 143--150
  ident: e_1_2_1_28_1
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1976--1986
  ident: e_1_2_1_13_1
– ident: e_1_2_1_8_1
  doi: 10.1109/INFCOM.2001.916662
– ident: e_1_2_1_7_1
  doi: 10.1007/11776178_33
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM).
  ident: e_1_2_1_4_1
– volume-title: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom).
  ident: e_1_2_1_11_1
– ident: e_1_2_1_24_1
  doi: 10.1145/381677.381693
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1917--1928
  ident: e_1_2_1_5_1
– volume-title: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2926--2931
  ident: e_1_2_1_20_1
– volume-title: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. 344--359
  ident: e_1_2_1_3_1
– ident: e_1_2_1_26_1
  doi: 10.1145/941311.941314
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 324--331
  ident: e_1_2_1_19_1
– ident: e_1_2_1_22_1
  doi: 10.1109/TMC.2002.1011059
– ident: e_1_2_1_10_1
– volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 775--784
  ident: e_1_2_1_1_1
– volume-title: Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON). 406--414
  ident: e_1_2_1_9_1
SSID ssj0033430
Score 1.9586196
Snippet Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 1
Title A security and robustness performance analysis of localization algorithms to signal strength attacks
URI https://www.proquest.com/docview/34696166
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1550-4867
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0033430
  issn: 1550-4859
  databaseCode: ADMLS
  dateStart: 20090201
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF5BeoFDxVO0pbAHhJAiB3u968fRSltVKC0HEhFOltfeLZGC7dbOofx6Zte7dlJAPC52ZHljy_NpHjsz3yD0hsdCqPySQ7OcqK0b4UQFo06ceW4kFOcX19UWl8H5gn5YsuVQkKm7S1o-yb__sq_kf6QK10Cuqkv2HyTb_ylcgN8gXziChOH4VzJOxo0ZP9eViVd807Rad9U7_QAD74g2Xab1cpytrypY_PWbZnlQlRymeaS8Ug1vbav677e912R6oWZK2AHjOtPQQBxc3YzLrpy899CnpuvjC5jGW2selWJfi1WjmQu1ium803ZVVv3Kma4vWK6y6nZALpjUutZ7r5-zQuxsVcS2unnQrsx1aGQowI36ZXdR9rNSp6yjBaCUuJPuTAb7ZXP2lx_Ts8Vsls5Pl_O39bWjJoupDLwZs3If7RHQ_O4I7SUnF7NP1l77PtUTafqXMwRQ8NT3d56567vsmm7tj8wfoX0TSOCkQ8VjdE-UT9DDLXrJp6hIsMUHBnzgAR94Cx_Y4gNXEm_jAw_4wG2FO3xgiw9s8PEMLc5O59Nzx0zVcHISktYhhOdBAI67pEIxs-fSz704okSEEAsUoetxMMZZxPOYRCznrCi4JLIAb4pJL_T952hUVqV4gTDjUul_HlEZ0gxiDRm6hEe-50sVqbMDNLHfK80N5byafLJOu3Z4lpoPbM7kAL3rF9Qd28rvb31tBZCCRlRprqwU1aZJfRrEgRcEh3-84wg9GGD6Eo3am404Bh-z5a8MSH4AU-iELQ
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+security+and+robustness+performance+analysis+of+localization+algorithms+to+signal+strength+attacks&rft.jtitle=ACM+transactions+on+sensor+networks&rft.au=Chen%2C+Yingying&rft.au=Kleisouris%2C+Konstantinos&rft.au=Li%2C+Xiaoyan&rft.au=Trappe%2C+Wade&rft.date=2009-02-01&rft.issn=1550-4859&rft.volume=5&rft.issue=1&rft_id=info:doi/10.1145%2F1464420.1464422&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-4859&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-4859&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-4859&client=summon