论文标题
在随机部署的无线网络中进行安全定位
Towards Secure Localization in Randomly Deployed Wireless Networks
论文作者
论文摘要
能够准确地定位无线设备,同时保证高级安全性免于欺骗攻击,使本地化链中的所有参与者(例如,最终用户,网络运营商和位置服务提供商)中的所有参与者都受益。一方面,大多数现有的本地化系统都是为无害环境而设计的,那里没有恶意的对手。这使他们非常容易受到来自干涉,攻击甚至无意错误(故障)的安全威胁,因此在敌对环境中实际上徒劳无功。另一方面,现有的安全本地化解决方案可以对网络拓扑的某些(有利的)假设(例如,目标设备位于由参考点形成的凸船体内),这限制了其适用性。因此,这项工作解决了在存在恶意攻击者的情况下随机部署无线网络中目标定位的问题,其目标是操纵估计过程(欺骗)估算过程并禁用准确的本地化。我们提出了一种基于聚类和加权中央质量的低复合解决方案,以检测攻击者,仅使用最低参考点,然后通过两分配程序解决定位问题。从攻击者检测点的定位准确性和成功中研究了所提出的方法,其中得出了攻击者检测概率的上限和下限的封闭形式表达式。通过计算机模拟来验证其性能,该计算机模拟证实了所提出的方案的有效性,表现优于最先进的方法。
Being able to accurately locate wireless devices, while guaranteeing high-level of security against spoofing attacks, benefits all participants in the localization chain (e.g., end users, network operators, and location service providers). On the one hand, most of existing localization systems are designed for innocuous environments, where no malicious adversaries are present. This makes them highly susceptible to security threats coming from interferers, attacks or even unintentional errors (malfunctions) and thus, practically futile in hostile settings. On the other hand, existing secure localization solutions make certain (favorable) assumptions regarding the network topology (e.g., that the target device lies within a convex hull formed by reference points), which restrict their applicability. Therefore, this work addresses the problem of target localization in randomly deployed wireless networks in the presence of malicious attackers, whose goal is to manipulate (spoof) the estimation process and disable accurate localization. We propose a low-complex solution based on clustering and weighted central mass to detect attackers, using only the bare minimum of reference points, after which we solve the localization problem by a bisection procedure. The proposed method is studied from both localization accuracy and success in attacker detection point of views, where closed-form expressions for upper and lower bounds on the probability of attacker detection are derived. Its performance is validated through computer simulations, which corroborate the effectiveness of the proposed scheme, outperforming the state-of-the-art methods.