The active badge location system
ACM Transactions on Information Systems (TOIS)
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Range-free localization schemes for large scale sensor networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Distributed localization in wireless sensor networks: a quantitative comparison
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Robust statistical methods for securing wireless localization in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Indoor localization using improved RSS-based lateration methods
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Hi-index | 0.00 |
Trustworthy location information is important because it is a critical input to a wide variety of location-based applications. However, the localization infrastructure is vulnerable to physical attacks and consequently the localization results are affected. In this paper, we focus on achieving robust wireless localization when attacks are present on access points. We first investigate the effects of attacks on localization. We then derive an attack-resistant scheme that can be integrated with existing localization algorithms and are not algorithm-specific. Our attack-resistant scheme are based on K-means clustering analysis. We examined our approach using received signal strength (RSS) in widely used lateration-based algorithms. We validated our method in the ORBIT testbed with an IEEE 802.11 (Wi-Fi) network. Our experimental results demonstrate that our proposed approach can achieve comparable localization performance when under access-point attacks as compared to normal situations without attack.