Wireless LAN location-sensing for security applications

This paper considers the problem of using wireless LAN location-sensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data. The introduction of model error can drastically reduce the robustness of the location estimates and such errors can be actively induced by malicious users intent on hiding their location. This paper provides a technique for increasing robustness in the face of model error and experimentally validates this technique by testing against unmodeled hardware, modulation of power levels, and the placement of devices outside the trained workspace. Our results have interesting ramifications for location privacy in wireless networks.

[1]  Henry Tirri,et al.  A Probabilistic Approach to WLAN User Location Estimation , 2002, Int. J. Wirel. Inf. Networks.

[2]  Gaetano Borriello,et al.  SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength , 2000 .

[3]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[4]  William A. Arbaugh,et al.  Security problems in 802.11-based networks , 2003, CACM.

[5]  V. Padmanabhan,et al.  Enhancements to the RADAR User Location and Tracking System , 2000 .

[6]  Gaetano Borriello,et al.  Location Systems for Ubiquitous Computing , 2001, Computer.

[7]  Leslie Pack Kaelbling,et al.  Planning and Acting in Partially Observable Stochastic Domains , 1998, Artif. Intell..

[8]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[9]  Moustafa Youssef,et al.  WLAN location determination via clustering and probability distributions , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[10]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[11]  Ted Kremenek,et al.  A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.

[12]  Tong Liu,et al.  Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks , 1998, IEEE J. Sel. Areas Commun..

[13]  Michael R. M. Jenkin,et al.  Computational principles of mobile robotics , 2000 .

[14]  Seth J. Teller,et al.  The cricket compass for context-aware mobile applications , 2001, MobiCom '01.

[15]  Moustafa Youssef,et al.  Small-scale compensation for WLAN location determination systems , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[16]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[17]  Tomoyoshi Oono,et al.  Position location technologies using signal strength in cellular systems , 2001, IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202).

[18]  David P. Kormann,et al.  802.11b access point mapping , 2003, CACM.

[19]  Wolfram Burgard,et al.  The Interactive Museum Tour-Guide Robot , 1998, AAAI/IAAI.

[20]  Steven M. Bellovin,et al.  The Security Flag in the IPv4 Header , 2003, RFC.

[21]  J. Werb,et al.  Designing a positioning system for finding things and people indoors , 1998 .

[22]  J. Krumm,et al.  Multi-camera multi-person tracking for EasyLiving , 2000, Proceedings Third IEEE International Workshop on Visual Surveillance.

[23]  Steven M. Bellovin The Security Flag in the IPv4 Header , 2003 .

[24]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[25]  Dieter Fox,et al.  An experimental comparison of localization methods continued , 2002, IEEE/RSJ International Conference on Intelligent Robots and Systems.

[26]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[27]  W. Burgard,et al.  Markov Localization for Mobile Robots in Dynamic Environments , 1999, J. Artif. Intell. Res..

[28]  Sebastian Thrun,et al.  Probabilistic Algorithms in Robotics , 2000, AI Mag..

[29]  John Canny,et al.  Some Techniques for Privacy in Ubicomp and Context-Aware Applications , 2002 .

[30]  Kostas E. Bekris,et al.  Robotics-Based Location Sensing Using Wireless Ethernet , 2002, MobiCom '02.