Planning and acting in partially observable stochastic domains
Artificial Intelligence
The interactive museum tour-guide robot
AAAI '98/IAAI '98 Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence
Computational principles of mobile robotics
Computational principles of mobile robotics
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
The cricket compass for context-aware mobile applications
Proceedings of the 7th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
A Probabilistic Room Location Service for Wireless Networked Environments
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Communications of the ACM - Wireless networking security
WLAN Location Determination via Clustering and Probability Distributions
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Multi-Camera Multi-Person Tracking for EasyLiving
VS '00 Proceedings of the Third IEEE International Workshop on Visual Surveillance (VS'2000)
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks
IEEE Journal on Selected Areas in Communications
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Sentire: A Framework for Building Middleware for Sensor and Actuator Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Robotics-based location sensing using wireless Ethernet
Wireless Networks
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
A low-cost robust localization scheme for WLAN
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Wireless and physical security via embedded sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Location constraints in digital rights management
Computer Communications
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
A security and robustness performance analysis of localization algorithms to signal strength attacks
ACM Transactions on Sensor Networks (TOSN)
Design of an adaptive positioning system based on WiFi radio signals
Computer Communications
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Unsupervised Learning for Solving RSS Hardware Variance Problem in WiFi Localization
Mobile Networks and Applications
The directional attack on wireless localization: how to spoof your location with a tin can
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cramér-Rao bound analysis of localization using signal strength difference as location fingerprint
INFOCOM'10 Proceedings of the 29th conference on Information communications
Utilization of user feedback in indoor positioning system
Pervasive and Mobile Computing
WiGEM: a learning-based approach for indoor localization
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
A study of bluetooth propagation using accurate indoor location mapping
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Hi-index | 0.00 |
This paper considers the problem of using wireless LAN location-sensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data. The introduction of model error can drastically reduce the robustness of the location estimates and such errors can be actively induced by malicious users intent on hiding their location. This paper provides a technique for increasing robustness in the face of model error and experimentally validates this technique by testing against unmodeled hardware, modulation of power levels, and the placement of devices outside the trained workspace. Our results have interesting ramifications for location privacy in wireless networks.