Attack Tolerance of RSS-based Fingerprinting
Richter, Philipp; Valkama, Mikko; Lohan, Elena-Simona (2018-04-15)
Richter, Philipp
Valkama, Mikko
Lohan, Elena-Simona
IEEE
15.04.2018
IEEE Wireless Communications and Networking Conference (WCNC)
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tty-201806131974
https://urn.fi/URN:NBN:fi:tty-201806131974
Kuvaus
Peer reviewed
Tiivistelmä
This paper studies the performance of Received Signal Strength (RSS)-based fingerprinting positioning methods under different attack scenarios. We discuss different attack models and we compare the accuracy of a commonly used RSS fingerprinting algorithm with a robust version relying on access node visibility, with respect to those attacks. The results show that the robust fingerprinting method does not outperform the traditional fingerprinting method for most attacks, nevertheless, for a few attack types the accuracy improvement, in terms of Root Mean Square Error (RMSE), can yield factor two. RSS-based fingerprinting methods are most vulnerable to jamming, spoofing and interchanging of access nodes and least vulnerable to random removal of access nodes.
Kokoelmat
- TUNICRIS-julkaisut [19188]