A security and robustness performance analysis of localization algorithms to signal strength attacks
Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where...
Saved in:
| Published in | ACM transactions on sensor networks Vol. 5; no. 1; pp. 1 - 37 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
01.02.2009
|
| Online Access | Get full text |
| ISSN | 1550-4859 1550-4867 |
| DOI | 10.1145/1464420.1464422 |
Cover
| Abstract | Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm. |
|---|---|
| AbstractList | Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Hölder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Hölder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm. Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens their viability for sensor applications. In this work, we examine several localization algorithms and evaluate their robustness to attacks where an adversary attenuates or amplifies the signal strength at one or more landmarks. We study both point-based and area-based methods that employ received signal strength for localization, and propose several performance metrics that quantify the estimator's precision, bias, and error, including Holder metrics, which quantify the variability in position space for a given variability in signal strength space. We then conduct a trace-driven evaluation of a set of representative algorithms, where we measured their performance as we applied attacks on real data from two different buildings. We found the median error degraded gracefully, with a linear response as a function of the attack strength. We also found that area-based algorithms experienced a decrease and a spatial-shift in the returned area under attack, implying that precision increases though bias is introduced for these schemes. Additionally, we observed similar values for the average Holder metric across most of the algorithms, thereby providing strong experimental evidence that nearly all the algorithms have similar average responses to signal strength attacks with the exception of the Bayesian Networks algorithm. |
| Author | Kleisouris, Konstantinos Trappe, Wade Chen, Yingying Martin, Richard P. Li, Xiaoyan |
| Author_xml | – sequence: 1 givenname: Yingying surname: Chen fullname: Chen, Yingying organization: Stevens Institute of Technology, Hoboken, NJ – sequence: 2 givenname: Konstantinos surname: Kleisouris fullname: Kleisouris, Konstantinos organization: Rutgers University, Piscataway, NJ – sequence: 3 givenname: Xiaoyan surname: Li fullname: Li, Xiaoyan organization: Lafayette College, Easton, PA – sequence: 4 givenname: Wade surname: Trappe fullname: Trappe, Wade organization: Rutgers University, Piscataway, NJ – sequence: 5 givenname: Richard P. surname: Martin fullname: Martin, Richard P. organization: Rutgers University, Piscataway, NJ |
| BookMark | eNp1kD1PwzAQhi0EEm1hZvXEFho7dhKPVcWXVIkF5shxzq3BjYvPGcqvJ7QVAxLTc6d7nxveKTnvQw-E3LD8jjEh50yUQvBxOZCfkQmTMs9EXVbnv7NUl2SK-J7nRSGKfEK6BUUwQ3RpT3Xf0RjaAVMPiHQH0Ya41b2B8aT9Hh3SYKkPRnv3pZMLPdV-HUZ5s0WaAkW3HoMUU4R-nTZUp6TNB16RC6s9wvWJM_L2cP-6fMpWL4_Py8UqM7ziKeO8NWUpmbIClAZlbGGYqgWHSlVVV-WsBW103RrFa2la2XWt5bYzANKyqihm5Pb4dxfD5wCYmq1DA97rHsKATSFKVbKyHIPzY9DEgBjBNrvotjruG5Y3P202pzZP5KMh_xjGpUMFKWrn__W-AetgfQg |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2016_2606486 crossref_primary_10_1371_journal_pone_0177326 crossref_primary_10_1002_sec_323 crossref_primary_10_1109_TPDS_2011_299 crossref_primary_10_1109_TCOMM_2012_040212_100291 crossref_primary_10_1007_s11276_011_0386_z crossref_primary_10_1109_TVT_2014_2385814 crossref_primary_10_1088_1757_899X_383_1_012054 |
| Cites_doi | 10.1145/345910.345917 10.1145/778415.778439 10.1145/941311.941313 10.1109/INFCOM.2001.916662 10.1007/11776178_33 10.1145/381677.381693 10.1145/941311.941314 10.1109/TMC.2002.1011059 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1145/1464420.1464422 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1550-4867 |
| EndPage | 37 |
| ExternalDocumentID | 10_1145_1464420_1464422 |
| GroupedDBID | -DZ .4S .DC 23M 4.4 5GY 5VS 8US AAKMM AALFJ AAYFX AAYXX ABPPZ ACGFO ACM ADBCU ADL ADMLS AEBYY AEFXT AEGXH AEJOY AENEX AENSD AFFNX AFWIH AFWXC AIAGR AIKLT AKRVB ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BDXCO CCLIF CITATION CS3 D0L EBS EDO EJD FEDTE GUFHI HF~ HGAVV H~9 I07 LHSKQ P1C P2P RNS ROL TUS XOL ZCA 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c272t-22bc66519f4e9ae9cf3c19842e7977d701beaca8bc9285cb5ddbf2fdcee5f1733 |
| ISSN | 1550-4859 |
| IngestDate | Fri Jul 11 15:20:41 EDT 2025 Wed Oct 01 05:53:47 EDT 2025 Thu Apr 24 23:00:54 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c272t-22bc66519f4e9ae9cf3c19842e7977d701beaca8bc9285cb5ddbf2fdcee5f1733 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 34696166 |
| PQPubID | 23500 |
| PageCount | 37 |
| ParticipantIDs | proquest_miscellaneous_34696166 crossref_primary_10_1145_1464420_1464422 crossref_citationtrail_10_1145_1464420_1464422 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2009-02-01 |
| PublicationDateYYYYMMDD | 2009-02-01 |
| PublicationDate_xml | – month: 02 year: 2009 text: 2009-02-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationTitle | ACM transactions on sensor networks |
| PublicationYear | 2009 |
| References | Hu Y. (e_1_2_1_13_1) Youssef M. (e_1_2_1_28_1) Liu D. (e_1_2_1_18_1) Niculescu D. (e_1_2_1_20_1) Elnahrawy E. (e_1_2_1_9_1) e_1_2_1_23_1 e_1_2_1_24_1 Chen Y. (e_1_2_1_6_1) e_1_2_1_21_1 e_1_2_1_22_1 Capkun S. (e_1_2_1_4_1) e_1_2_1_27_1 Lang S. (e_1_2_1_14_1) e_1_2_1_25_1 e_1_2_1_26_1 Hightower J. (e_1_2_1_12_1) 2000 Battiti R. (e_1_2_1_2_1) 2002 Lim H. (e_1_2_1_17_1) Brands S. (e_1_2_1_3_1) Li Z. (e_1_2_1_16_1) Madigan D. (e_1_2_1_19_1) Lazos L. (e_1_2_1_15_1) e_1_2_1_7_1 e_1_2_1_8_1 Bahl P. (e_1_2_1_1_1) e_1_2_1_10_1 Hazas M. (e_1_2_1_11_1) Capkun S. (e_1_2_1_5_1) |
| References_xml | – ident: e_1_2_1_21_1 doi: 10.1145/345910.345917 – volume-title: Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). ident: e_1_2_1_6_1 – volume-title: Tech. Rep. DIT-02-086 year: 2002 ident: e_1_2_1_2_1 – volume-title: Real and Functional Analysis ident: e_1_2_1_14_1 – volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 324--331 ident: e_1_2_1_15_1 – ident: e_1_2_1_25_1 doi: 10.1145/778415.778439 – ident: e_1_2_1_27_1 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). ident: e_1_2_1_17_1 – volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 99--106 ident: e_1_2_1_18_1 – volume-title: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks (IPSN). 91--98 ident: e_1_2_1_16_1 – volume-title: Spoton: An indoor 3d location sensing technology based on rf signal strength. Tech. Rep. 00-02-02 year: 2000 ident: e_1_2_1_12_1 – ident: e_1_2_1_23_1 doi: 10.1145/941311.941313 – volume-title: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). 143--150 ident: e_1_2_1_28_1 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1976--1986 ident: e_1_2_1_13_1 – ident: e_1_2_1_8_1 doi: 10.1109/INFCOM.2001.916662 – ident: e_1_2_1_7_1 doi: 10.1007/11776178_33 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). ident: e_1_2_1_4_1 – volume-title: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom). ident: e_1_2_1_11_1 – ident: e_1_2_1_24_1 doi: 10.1145/381677.381693 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 1917--1928 ident: e_1_2_1_5_1 – volume-title: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 2926--2931 ident: e_1_2_1_20_1 – volume-title: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. 344--359 ident: e_1_2_1_3_1 – ident: e_1_2_1_26_1 doi: 10.1145/941311.941314 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 324--331 ident: e_1_2_1_19_1 – ident: e_1_2_1_22_1 doi: 10.1109/TMC.2002.1011059 – ident: e_1_2_1_10_1 – volume-title: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). 775--784 ident: e_1_2_1_1_1 – volume-title: Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON). 406--414 ident: e_1_2_1_9_1 |
| SSID | ssj0033430 |
| Score | 1.9586196 |
| Snippet | Recently, it has been noted that localization algorithms that use signal strength are susceptible to noncryptographic attacks, which consequently threatens... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Enrichment Source Index Database |
| StartPage | 1 |
| Title | A security and robustness performance analysis of localization algorithms to signal strength attacks |
| URI | https://www.proquest.com/docview/34696166 |
| Volume | 5 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1550-4867 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0033430 issn: 1550-4859 databaseCode: ADMLS dateStart: 20090201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF5BeoFDxVO0pbAHhJAiB3u968fRSltVKC0HEhFOltfeLZGC7dbOofx6Zte7dlJAPC52ZHljy_NpHjsz3yD0hsdCqPySQ7OcqK0b4UQFo06ceW4kFOcX19UWl8H5gn5YsuVQkKm7S1o-yb__sq_kf6QK10Cuqkv2HyTb_ylcgN8gXziChOH4VzJOxo0ZP9eViVd807Rad9U7_QAD74g2Xab1cpytrypY_PWbZnlQlRymeaS8Ug1vbav677e912R6oWZK2AHjOtPQQBxc3YzLrpy899CnpuvjC5jGW2selWJfi1WjmQu1ium803ZVVv3Kma4vWK6y6nZALpjUutZ7r5-zQuxsVcS2unnQrsx1aGQowI36ZXdR9rNSp6yjBaCUuJPuTAb7ZXP2lx_Ts8Vsls5Pl_O39bWjJoupDLwZs3If7RHQ_O4I7SUnF7NP1l77PtUTafqXMwRQ8NT3d56567vsmm7tj8wfoX0TSOCkQ8VjdE-UT9DDLXrJp6hIsMUHBnzgAR94Cx_Y4gNXEm_jAw_4wG2FO3xgiw9s8PEMLc5O59Nzx0zVcHISktYhhOdBAI67pEIxs-fSz704okSEEAsUoetxMMZZxPOYRCznrCi4JLIAb4pJL_T952hUVqV4gTDjUul_HlEZ0gxiDRm6hEe-50sVqbMDNLHfK80N5byafLJOu3Z4lpoPbM7kAL3rF9Qd28rvb31tBZCCRlRprqwU1aZJfRrEgRcEh3-84wg9GGD6Eo3am404Bh-z5a8MSH4AU-iELQ |
| linkProvider | EBSCOhost |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+security+and+robustness+performance+analysis+of+localization+algorithms+to+signal+strength+attacks&rft.jtitle=ACM+transactions+on+sensor+networks&rft.au=Chen%2C+Yingying&rft.au=Kleisouris%2C+Konstantinos&rft.au=Li%2C+Xiaoyan&rft.au=Trappe%2C+Wade&rft.date=2009-02-01&rft.issn=1550-4859&rft.volume=5&rft.issue=1&rft_id=info:doi/10.1145%2F1464420.1464422&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1550-4859&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1550-4859&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1550-4859&client=summon |