Analysis on perfect location spoofing attacks using beamforming

Location spoofing attacks pose serious threats to the location based wireless network mechanisms. Most existing literature focuses on detecting location spoofing attacks or design of robust localization algorithms. However, our study shows that, in many circumstances, perfect location spoofing (PLS) can stay undetected even if robust localization algorithms or detection mechanisms are used. In this paper, we present theoretical analysis on the feasibility of beamforming-based PLS attacks and how it is affected by the anchor deployment. We formulate PLS as a nonlinear feasibility problem based on smart antenna array pattern synthesis. Due to the intractable nature of this feasibility problem, we solve it using semidefinite relaxation (SDR) in conjunction with a heuristic local search algorithm. Simulation results show the effectiveness of our analytical approach and provide insightful advices for defence against PLS attacks.

[1]  Sunghun Kim,et al.  Robust Localization with Unknown Transmission Power for Cognitive Radio , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[2]  Richard P. Martin,et al.  Attack Detection in Wireless Localization , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[4]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[5]  Prashant Krishnamurthy,et al.  Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.

[6]  Ioannis N. Psaromiligkos,et al.  Received signal strength based location estimation of a wireless LAN client , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[7]  R. Michael Buehrer,et al.  Location Spoofing Attack Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Indrakshi Ray,et al.  Towards a location-based mandatory access control model , 2006, Comput. Secur..

[9]  Xiaoyan Li Designing localization algorithms robust to signal strength attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[10]  Ernesto Damiani,et al.  Supporting location-based conditions in access control policies , 2006, ASIACCS '06.

[11]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[12]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[13]  Srinivasan Seshan,et al.  Access Point Localization Using Local Signal Strength Gradient , 2009, PAM.

[14]  R. Vescovo Pattern synthesis with null constraints for circular arrays of equally spaced isotropic elements , 1996 .

[15]  Markus Breitenbach,et al.  The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[16]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[17]  V. Padmanabhan,et al.  Enhancements to the RADAR User Location and Tracking System , 2000 .