Advertisement

Analysis of Location Spoofing Identification in Cellular Networks

  • Yuxin Wei
  • Dawei LiuEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9395)

Abstract

Location spoofing is considered as a serious threat to positioning and location based services in wireless networks. Existing identification methods for location spoofing have focused primarily on wireless sensor networks. These methods may not be applicable in cellular networks due to the following two limitations: (i) relying on accurate distance measurement; (ii) incapable of dealing with bad propagation conditions. To address these two issues, we carry out an analysis of location spoofing based on angle-of-arrival (AOA) and time-difference-of-arrival (TDOA) measurement models, two commonly used signal measurement models in cellular networks, in bad propagation conditions with large measurement errors. Our analysis shows that AOA model is more robust to location spoofing in noisy conditions.

Keywords

Sensor Node Wireless Sensor Network Mobile Station Cellular Network Radio Signal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgement

This work was supported in part by the Natural Science Foundation of Jiangsu Province under Grant BK20140404, by the Jiangsu University Natural Science Research Programme under Grant 13KJB510035, and by the Suzhou Science and Technology Development Plan under Grant SYG201405.

References

  1. 1.
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of ACM workshop on Wireless Security, pp. 1–10 (2003)Google Scholar
  2. 2.
    Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. Proc. IEEE INFOCOM 3, 1917–1928 (2005)Google Scholar
  3. 3.
    Anjum, F., Pandey, S., Agrawal, P.: Secure localization in sensor networks using transmission range variation. In: Proceedings of IEEE MASS, pp. 195–203 (2005)Google Scholar
  4. 4.
    Wang, T., Yang, Y.: Analysis on perfect location spoofing attacks using beamforming. In: Proceedings of IEEE INFOCOM, pp. 2778–2786 (2013)Google Scholar
  5. 5.
    Liu, D.: Identifying malicious attacks to wireless localization in bad channel conditions. In: Proceedings of IEEE International Workshop on Mission-Oriented Wireless Sensor Networking (MiSeNet), pp. 636–641 (2014)Google Scholar
  6. 6.
    Zhang, Y., Liu, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun. 24(4), 829–835 (2006)CrossRefGoogle Scholar
  7. 7.
    Cong, L., Zhuang, W.: Hybrid TDOA/AOA mobile user location for wideband CDMA cellularsystems. IEEE Trans. Wirel. Commun. 1(3), 439–447 (2002)CrossRefGoogle Scholar
  8. 8.
    Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: Proceedings of ACM/IEEE IPSN 2005, pp, 99–106 (2005)Google Scholar
  9. 9.
    Capkun, S., Rasmussen, K., Cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470–483 (2008)CrossRefGoogle Scholar
  10. 10.
    Sayed, A., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. IEEE Sig. Process. Mag. 22(4), 24–40 (2005)CrossRefGoogle Scholar
  11. 11.
    Liu, D., Lee, M.C., Pun, C.M., Liu, H.: Analysis of wireless localization in nonline-of-sight conditions. IEEE Trans. Veh. Technol. 62(4), 1484–1492 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Air Force Engineering UniversityXi’anChina
  2. 2.Xi’An JiaoTong-Liverpool UniversitySuzhouChina

Personalised recommendations