Geo-Spatial Location Spoofing Detection for Internet of Things

We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced location spoofing detection using audibility (ELSA), which can be implemented at the backend server without modifying existing legacy IoT systems. ELSA is based on a statistical decision theory framework and uses two-way time-of-arrival (TW-TOA) information between the user's device and the anchors. In addition to the TW-TOA information, ELSA exploits the implicit audibility information (or outage information) to improve detection rates of location spoofing attacks. Given TW-TOA and audibility information, we derive the decision rule for the verification of the device's location, based on the generalized likelihood ratio test. We develop a practical threat model for delay measurements' spoofing scenarios, and investigate in detail the performance of ELSA in terms of detection and false alarm rates. Our extensive simulation results on both synthetic and real-world datasets demonstrate the superior performance of ELSA compared to conventional non-audibility-aware approaches.

[1]  S Lanzisera,et al.  Radio Frequency Time-of-Flight Distance Measurement for Low-Cost Wireless Sensor Localization , 2011, IEEE Sensors Journal.

[2]  R.L. Moses,et al.  Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.

[3]  Srdjan Capkun,et al.  Integrity Regions: Authentication through Presence in Wireless Networks , 2010, IEEE Trans. Mob. Comput..

[4]  Sarvesh Bhardwaj,et al.  Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.

[5]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[6]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[7]  Mikhail Nesterenko,et al.  Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  A. Ramesh,et al.  DISCOVERY AND VERIFICATION OF NEIGHBOR POSITIONS IN MOBILE AD HOC NETWORKS , 2014 .

[9]  Yong Guan,et al.  Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Moe Z. Win,et al.  Ranging With Ultrawide Bandwidth Signals in Multipath Environments , 2009, Proceedings of the IEEE.

[11]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[12]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[13]  Shihao Yan,et al.  Location Verification Systems for VANETs in Rician Fading Channels , 2014, IEEE Transactions on Vehicular Technology.

[14]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[15]  Ismail Güvenç,et al.  A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.

[16]  Jihyuk Choi,et al.  Secure Location Verification Using Simultaneous Multilateration , 2012, IEEE Transactions on Wireless Communications.

[17]  Po Yang PRLS-INVES: A General Experimental Investigation Strategy for High Accuracy and Precision in Passive RFID Location Systems , 2015, IEEE Internet of Things Journal.

[18]  Marco Fiore,et al.  Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing , 2014, IEEE Transactions on Mobile Computing.

[19]  Gianluca Dini,et al.  On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding , 2014, IEEE Communications Letters.

[20]  Nicola Basilico,et al.  Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.

[21]  Alfred O. Hero,et al.  Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..

[22]  Shihao Yan,et al.  An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[23]  Ragib Hasan,et al.  WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices , 2016, IEEE Transactions on Emerging Topics in Computing.

[24]  D. Rubin INFERENCE AND MISSING DATA , 1975 .

[25]  Marcin Poturalski,et al.  The cicada attack: Degradation and denial of service in IR ranging , 2010, 2010 IEEE International Conference on Ultra-Wideband.

[26]  Moe Z. Win,et al.  A Machine Learning Approach to Ranging Error Mitigation for UWB Localization , 2012, IEEE Transactions on Communications.

[27]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[28]  Erol Gelenbe,et al.  Signalling storms in 3G mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[29]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[30]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[31]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[32]  Shihao Yan,et al.  Timing information in wireless communications and optimal location verification frameworks , 2014, 2014 Australian Communications Theory Workshop (AusCTW).

[33]  Srdjan Capkun,et al.  Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.

[34]  Erol Gelenbe,et al.  Mitigating for Signalling Attacks in UMTS Networks , 2014, ISCIS.