Staff View
Securing wireless localization against signal strength attacks

Descriptive

TypeOfResource
Text
TitleInfo (ID = T-1); (type = uniform)
Title
Securing wireless localization against signal strength attacks
Identifier (type = hdl)
http://hdl.rutgers.edu/1782.2/rucore10001600001.ETD.15800
Identifier
ETD_266
Language
LanguageTerm (authority = ISO639-2)
eng
Genre (authority = marcgt)
theses
Subject (ID = SBJ-1); (authority = RUETD)
Topic
Computer Science
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Wireless communication systems
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Sensor networks
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Detectors
Subject (ID = SBJ-1); (authority = ETD-LCSH)
Topic
Multisensor data fusion
Abstract
Accurately positioning nodes in wireless and sensor networks is important because the location of devices and sensors is a critical input to many higher-level applications. However, the localization infrastructure can be subjected to non-cryptographic attacks, such as signal attenuation and amplification, that can not be addressed by traditional security services. This thesis aims to provide secure and accurate location information in wireless and sensor networks by characterizing the response of localization algorithms to attacks, detecting attacks, localizing adversaries, and additionally, improving localization performance.
First we studied the robustness of localization algorithms to signal strength attacks. We found the performance of localization algorithms degrades significantly under attacks when signals are attenuated or amplified by an adversary. We then formulated a theoretical foundation for the attack detection problem using statistical significance testing. We proposed attack detection schemes for two broad localization approaches: signal strength and multilateration. We found that different localization systems all contain similar attack detection capabilities. Next, we examined the applicability of localization methods to localize adversaries participating in identity-based spoofing attacks. We proposed a spoofing detector for wireless spoofing that utilizes K-means cluster analysis. We integrated our K-means attack detector into a real-time indoor localization system, which is capable of localizing the positions of attackers. Our experiments using both an 802.11 (WiFi) network as well as an 802.15.4 (ZigBee) network in two office buildings provide strong evidence of the effectiveness of our approach in attack detection and localizing the positions of the adversaries.
In addition, we investigated the impact of landmark placement on localization performance using a combination of analytic and experimental analysis. We developed a novel algorithm called maxL-minE algorithm that finds an optimized landmark deployment. Our experimental results show that our landmark placement algorithm is generic because the resulting placements improve localization performance significantly across a diverse set of algorithms, networks, and ranging modalities. Finally, we presented our general purpose real time localization infrastructure which targets to localize any radio-enabled wireless devices at anywhere and at anytime.
PhysicalDescription
Extent
xiv, 131 pages
InternetMediaType
application/pdf
InternetMediaType
text/xml
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references (p. 125-129).
Name (ID = NAME-1); (type = personal)
NamePart (type = family)
Chen
NamePart (type = given)
Yingying
NamePart (type = termsOfAddress)
Dr.
Role
RoleTerm (authority = RUETD); (type = )
author
DisplayForm
Yingying Chen
Name (ID = NAME-2); (type = personal)
NamePart (type = family)
Martin
NamePart (type = given)
Richard
Role
RoleTerm (authority = RULIB); (type = )
chair
Affiliation
Advisory Committee
DisplayForm
Richard P. Martin
Name (ID = NAME-3); (type = personal)
NamePart (type = family)
Trappe
NamePart (type = given)
Wade
Role
RoleTerm (authority = RULIB); (type = )
internal member
Affiliation
Advisory Committee
DisplayForm
Wade Trappe
Name (ID = NAME-4); (type = personal)
NamePart (type = family)
Madigan
NamePart (type = given)
David
Role
RoleTerm (authority = RULIB); (type = )
internal member
Affiliation
Advisory Committee
DisplayForm
David Madigan
Name (ID = NAME-5); (type = personal)
NamePart (type = family)
Su
NamePart (type = given)
Wei
Role
RoleTerm (authority = RULIB); (type = )
outside member
Affiliation
Advisory Committee
DisplayForm
Wei Su
Name (ID = NAME-1); (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB); (type = )
degree grantor
Name (ID = NAME-2); (type = corporate)
NamePart
Graduate School - New Brunswick
Role
RoleTerm (authority = RULIB); (type = )
school
OriginInfo
DateCreated (point = ); (qualifier = exact)
2007
DateOther (qualifier = exact); (type = degree)
2007
Location
PhysicalLocation (authority = marcorg)
NjNbRU
RelatedItem (type = host)
TitleInfo
Title
Graduate School - New Brunswick Electronic Theses and Dissertations
Identifier (type = local)
rucore19991600001
Identifier (type = doi)
doi:10.7282/T33T9HPW
Genre (authority = ExL-Esploro)
ETD doctoral
Back to the top

Rights

RightsDeclaration (AUTHORITY = GS); (ID = rulibRdec0006)
The author owns the copyright to this work.
Copyright
Status
Copyright protected
Availability
Status
Open
AssociatedEntity (AUTHORITY = rulib); (ID = 1)
Name
Yingying Chen
Role
Copyright holder
Affiliation
Rutgers University. Graduate School - New Brunswick
RightsEvent (AUTHORITY = rulib); (ID = 1)
Type
Permission or license
Detail
Non-exclusive ETD license
AssociatedObject (AUTHORITY = rulib); (ID = 1)
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Back to the top

Technical

Format (TYPE = mime); (VERSION = )
application/x-tar
FileSize (UNIT = bytes)
4337152
Checksum (METHOD = SHA1)
0a9aadd377db46e9dbe8831acbb409d98950a339
ContentModel
ETD
CompressionScheme
other
OperatingSystem (VERSION = 5.1)
windows xp
Format (TYPE = mime); (VERSION = NULL)
application/x-tar
Back to the top
Version 8.5.5
Rutgers University Libraries - Copyright ©2024