Skip to main content
Log in

Spoofing attacks and countermeasures in fm indoor localization system

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

FM-based indoor localization identifies the location of an user by looking at the received signal strength (RSS) at the user’s location. In this paper, we discover a spoofing attack which is able to cause the FM-based indoor localization system to malfunction. The newly discovered, easy launched spoofing attack which enables the adversary to deceive a victim user to obtain a fake indoor location through remotely manipulating the RSS at the user’s location simultaneously. By analyzing the features of the received and FM signals in the frequency domain, we propose a defense method to deal with this attack. The proposed method contains two levels of detections. Specifically, the first level of detection distinguishes between the normal signal and the attack/noise signal, and the second level of detection finally detects the existence of the attack signal. We perform real-world experiments on Universal Software Radio Peripherals (USRPs) to spoof a target location to four different locations 6 - 32 meters away from the target location. The experiment results show a promising performance of the proposed defense method with a false negative rate and a false alarm rate of 3.9% and 6.4%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14
Figure 15
Figure 16
Figure 17
Figure 18
Figure 19

Similar content being viewed by others

References

  1. Amin, M., Zhao, L., Lindsey, A.: Subspace array processing for the suppression of fm jamming in GPS receivers. IEEE Trans. Aerosp. Electron. Syst. 40(1), 80–92 (2004)

    Article  Google Scholar 

  2. Bahl, P., Padmanabhan, V.N.: Radar: an In-Building Rf-Based User Location and Tracking System INFOCOM 2000. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 775–784. IEEE (2000)

    Google Scholar 

  3. Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 79–87. 1 (2003)

    Google Scholar 

  4. Chan, E.C., Baciu, G.: Introduction to Wireless Localization: With IPhone SDK Examples. Wiley (2012)

  5. Chen, Y., Lymberopoulos, D., Liu, J., Priyantha, B.: FM-based indoor localization Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys ’12, p. 169. ACM Press, New York, New York, USA. doi:10.1145/2307636.2307653. http://dl.acm.org/citation.cfm?doid=2307636.2307653 (2012)

  6. Cheng, W., Zhang, X., Zhang, H.: Statistical-qos driven energy-efficiency optimization over green 5g mobile wireless networks. IEEE J. Sel. Areas Commun. 34, 1–1 (2016)

    Article  Google Scholar 

  7. Hill, D.N., T.C.J.R.E., E, K.A.: Signal type identification. US Patent 6,904,269 (2005)

  8. El-Badry, R., Sultan, A., Youssef, M.: Hyberloc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks Communications (ICC), 2010 IEEE International Conference On, pp. 1–5 (2010)

    Google Scholar 

  9. Ledvina, B.M., Bencze, W.J.G.B., Miller, I.: An In-Line Anti-Spoofing Device for Legacy Civil GPS Receivers Proceedings of the 2010 International Technical Meeting of the Institute of Navigation, pp. 698–712 (2001)

    Google Scholar 

  10. Li, X., Chen, Y., Yang, J., Zheng, X.: Achieving robust wireless localization resilient to signal strength attacks. Wirel. Netw 18(1), 45–58 (2012)

    Article  Google Scholar 

  11. Lim, H., Kung, L., Hou, J.C., Luo, H.: Zero-configuration indoor localization over ieee 802.11 wireless infrastructure. Wirel. Netw 16(2), 405–420 (2010)

    Article  Google Scholar 

  12. LLC, E.R. Universal software radio peripheral. http://www.ettus.com

  13. Moghtadaiee, V., Dempster, A.G., Lim, S.: Indoor Localization Using Fm Radio Signals: A Fingerprinting Approach Indoor Positioning and Indoor Navigation (IPIN), 2011 International Conference On, pp. 1–7. IEEE (2011)

    Google Scholar 

  14. Pahlavan, K.: Principles of wireless networks: A unified approach. Wiley Inc (2011)

  15. Popleteev, A., Osmani, V., Mayora, O.: Investigation of Indoor Localization with Ambient Fm Radio Stations Pervasive Computing and Communications (Percom), 2012 IEEE International Conference on, pp 171–179 (2012)

    Google Scholar 

  16. Rich, D., Bo, S., Cassara, F.: Cochannel fm interference suppression using adaptive notch filters. IEEE Trans. Commun. 42(7), 2384–2389 (1994)

    Article  Google Scholar 

  17. Sen, S., Radunovic, B., Choudhury, R.R., Minka, T.: You are Facing the Mona Lisa: Spot Localization Using Phy Layer Information Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 183–196. ACM (2012)

    Google Scholar 

  18. Temme, N.M.: Special functions: An introduction to the classical functions of mathematical physics. Wiley (2011)

  19. Tippenhauer, N.O., Pöpper, C.R.K.B., Capkun, S.: On the Requirements for Successful GPS Spoofing Attacks Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 75–86 (2011)

    Google Scholar 

  20. Tippenhauer, N., Rasmussen, K., Pöpper, C., Čapkun, S.: Attacks on Public Wlan-Based Positioning Systems Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 29–40. ACM (2009)

    Google Scholar 

  21. Wu, B., Wu, J.F.E.B.I.M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl. 30(3), 937–954 (2007)

    Article  Google Scholar 

  22. Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 24(1), 44–58 (2013)

    Article  Google Scholar 

  23. Yi, T., Li, H., Gu, M.: Recent research and applications of gps-based monitoring technology for high-rise structures. Struct. Control. Health Monit. 20(5), 649–670 (2013)

    Article  Google Scholar 

  24. Yoon, S., Lee, K., Rhee, I.: Fm-Based Indoor Localization via Automatic Fingerprint Db Construction and Matching Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp. 207–220 (2013)

    Google Scholar 

  25. Yoon, S., Lee, K., Yun, Y., Rhee, I.: Acmi: Fm-based indoor localization via autonomous fingerprinting. IEEE Trans. Mob. Comput. 15(6), 1318–1332 (2016)

    Article  Google Scholar 

  26. Youssef, M., Agrawala, A.: The Horus Wlan Location Determination System Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 205–218. ACM (2005)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 61170064, No. U1636209 and No. U1536202) and the “111 Project” of China (No. B08038).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zi Li.

Additional information

This article is part of the Topical Collection: Special Issue Security and Privacy of IoT

Guest Editors: Tarik Taleb, Zonghua Zhang, and Hua Wang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Pei, Q. & Liu, Y. Spoofing attacks and countermeasures in fm indoor localization system. World Wide Web 21, 219–240 (2018). https://doi.org/10.1007/s11280-017-0457-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-017-0457-x

Keywords

Navigation