Toward Secure Localization in Randomly Deployed Wireless Networks

Being able to accurately locate wireless devices, while guaranteeing high-level of security against spoofing attacks, benefits all participants in the localization chain (e.g., end users, network operators, and location service providers). On the one hand, most of existing localization systems are designed for innocuous environments, where no malicious adversaries are present. On the other hand, existing secure localization solutions make certain assumptions regarding the network topology, which restrict their applicability. Therefore, this work addresses the problem of target localization in randomly deployed wireless networks in the presence of a malicious attacker, whose goal is to manipulate (spoof) the estimation process in order to disable accurate localization. This is an important problem since strengthening the security of current non-secure systems or generalization of existing secure localization systems to ad hoc scenarios will enable additional reliable safety parameter (location) to be employed for digital interactions in more general contexts (such as social media, health monitoring or surveillance systems). We propose a low-complex solution based on clustering and weighted central mass to detect the attacker, using only the bare minimum of reference points, after which we solve the localization problem by a bisection procedure. The proposed method is studied from both localization accuracy and success in attacker detection point of views, where closed-form expressions for upper and lower bounds on the probability of attacker detection are derived. Its performance is validated through computer simulations, which corroborate the effectiveness of the proposed scheme, outperforming the state-of-the-art method.

[1]  Angelo Coluccia,et al.  On the Hybrid TOA/RSS Range Estimation in Wireless Sensor Networks , 2018, IEEE Transactions on Wireless Communications.

[2]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[3]  Eric Chaumette,et al.  Generalized Likelihood Ratio Test for Detection of Gaussian Rank-One Signals in Gaussian Noise With Unknown Statistics , 2017, IEEE Transactions on Signal Processing.

[4]  Cédric Lauradoux,et al.  1 Security of Distance-Bounding : A Survey , 2017 .

[5]  Wei Yu,et al.  Cloud radio access network: Virtualizing wireless access for dense heterogeneous systems , 2015, Journal of Communications and Networks.

[6]  Min Wu,et al.  An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[7]  J. J. Moré Generalizations of the trust region problem , 1993 .

[8]  Daojing He,et al.  Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[9]  Marko Beko,et al.  A Geometric Approach for Distributed Multi-Hop Target Localization in Cooperative Networks , 2020, IEEE Transactions on Vehicular Technology.

[10]  Yan Xie,et al.  UWB pulse detection and TOA estimation using GLRT , 2017, EURASIP J. Adv. Signal Process..

[11]  Hossein Hassani,et al.  On the Folded Normal Distribution , 2014, 1402.3559.

[12]  Youming Li,et al.  Robust Second-Order Cone Relaxation for TW-TOA-Based Localization With Clock Imperfection , 2016, IEEE Signal Processing Letters.

[13]  Srdjan Capkun,et al.  UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband , 2019, USENIX Security Symposium.

[14]  Tommy Svensson,et al.  6G White Paper on Localization and Sensing , 2020, ArXiv.

[15]  Marko Beko,et al.  Exact Robust Solution to TW-ToA-Based Target Localization Problem With Clock Imperfections , 2018, IEEE Signal Processing Letters.

[16]  Henk Wymeersch,et al.  Millimeter-Wave Downlink Positioning With a Single-Antenna Receiver , 2018, IEEE Transactions on Wireless Communications.

[17]  Helena Leppäkoski,et al.  5G Positioning: Security and Privacy Aspects , 2018 .

[18]  Bernard Henri Fleury,et al.  Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things , 2018 .

[19]  Kai-Kit Wong,et al.  Robust Localization for Mixed LOS/NLOS Environments With Anchor Uncertainties , 2020, IEEE Transactions on Communications.

[20]  Subrat Kar,et al.  Robust Range-Based Secure Localization in Wireless Sensor Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[21]  Srdjan Capkun,et al.  Are We Really Close? Verifying Proximity in Wireless Systems , 2017, IEEE Security & Privacy.

[22]  Marko Beko,et al.  3-D Target Localization in Wireless Sensor Networks Using RSS and AoA Measurements , 2017, IEEE Transactions on Vehicular Technology.

[23]  Elisa Bertino,et al.  Robust Sensor Localization against Known Sensor Position Attacks , 2019, IEEE Transactions on Mobile Computing.

[24]  Jian Li,et al.  Exact and Approximate Solutions of Source Localization Problems , 2008, IEEE Transactions on Signal Processing.

[25]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[26]  Jian Jiang,et al.  Sensor Network-Based Rigid Body Localization via Semi-Definite Relaxation Using Arrival Time and Doppler Measurements , 2019, IEEE Transactions on Wireless Communications.

[27]  Fredrik Gustafsson,et al.  EM- and JMAP-ML Based Joint Estimation Algorithms for Robust Wireless Geolocation in Mixed LOS/NLOS Environments , 2014, IEEE Transactions on Signal Processing.

[28]  Umberto Mengali,et al.  TOA Estimation with the IEEE 802.15.4a Standard , 2010, IEEE Transactions on Wireless Communications.

[29]  Hyundong Shin,et al.  Machine Learning for Wideband Localization , 2015, IEEE Journal on Selected Areas in Communications.

[30]  Kegen Yu,et al.  Wireless Positioning: Principles and Practice , 2018, Navigation: Science and Technology.

[31]  Marko Beko,et al.  RSS-Based Localization in Wireless Sensor Networks Using Convex Relaxation: Noncooperative and Cooperative Schemes , 2015, IEEE Transactions on Vehicular Technology.

[32]  K. C. Ho,et al.  An Asymptotically Efficient Estimator in Closed-Form for 3-D AOA Localization Using a Sensor Network , 2015, IEEE Transactions on Wireless Communications.

[33]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[34]  Feng Han,et al.  A Range-Based Secure Localization Algorithm for Wireless Sensor Networks , 2019, IEEE Sensors Journal.

[35]  Elena Simona Lohan,et al.  Analysis of Kurtosis-Based LOS/NLOS Identification Using Indoor MIMO Channel Measurement , 2013, IEEE Transactions on Vehicular Technology.

[36]  Benny Chitambira Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things , 2018 .

[37]  Erik G. Ström,et al.  TW-TOA based positioning in the presence of clock imperfections , 2014, Digit. Signal Process..