Timing information in wireless communications and optimal location verification frameworks

The verification of location information in wireless networks is a relatively new area of research, but one of growing importance. In this work we explore two formal theoretical frameworks for an optimal location verification system in which physical-layer timing information is the main observational input. In our first framework, we derive an optimal decision-rule using the system input/output mutual information as the optimization metric. In the second framework, a more traditional Bayesian approach is adopted in which the misclassification error is used as the decision-rule's optimization metric. A verification-performance comparison between time-of-arrival (ToA) information and the more easily determined received signal strength (RSS) information is given. Our key finding is that for ToA accuracies attainable in next generation wireless networks, significant improvement in location verification can be expected relative to current RSS-based techniques. Our results are important for a wide range of emerging wireless networks and services, but especially for emerging Intelligent Transport Systems (ITS), where the authentication of location information is of critical importance to the safety and security of system users.

[1]  Robert A. Malaney Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.

[2]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[3]  Christian Steffes,et al.  Determining Times Of Arrival Of Transponder Signals In A. Sensor Network Using Gps Time Synchronization , 2011, GI-Jahrestagung.

[4]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[5]  Fredrik Tufvesson,et al.  Measurement based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations , 2012, ArXiv.

[6]  Robert A. Malaney A location enabled wireless security system , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[7]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[8]  Alvin S. Lim,et al.  TOA Ranging Using Real Time Application Interface (RTAI) in IEEE 802.11 Networks , 2011, GreeNets.

[9]  Zafer Sahinoglu,et al.  The Cramer-Rao bounds of hybrid TOA/RSS and TDOA/RSS location estimation schemes , 2004, IEEE Communications Letters.

[10]  Robert A. Malaney Wireless Intrusion Detection Using Tracking Verification , 2007, 2007 IEEE International Conference on Communications.

[11]  Shihao Yan,et al.  Location Verification Systems in Emerging Wireless Networks , 2013, ArXiv.

[12]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[13]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[14]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[15]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[16]  Alfred O. Hero,et al.  Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..

[17]  R. Michael Buehrer,et al.  Handbook of Position Location: Theory, Practice and Advances , 2011 .

[18]  Yu Zhang,et al.  Evaluation of Localization Attacks on Power-Modulated Challenge–Response Systems , 2008, IEEE Transactions on Information Forensics and Security.

[19]  Shihao Yan,et al.  Signal strength based wireless Location Verification under spatially correlated shadowing , 2014, 2014 IEEE International Conference on Communications (ICC).

[20]  Enrica Zola,et al.  Software based measurement of round trip time observables for location in IEEE 802.11 networks , 2013, Proceedings of the 12th International Conference on Telecommunications.

[21]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[22]  Shihao Yan,et al.  An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).