Security of Cyber-Physical Infrastructure
Mona Alaa Mohi El Dien Abo El Naga;
Abstract
Abstract
Accurate indoor WiFi localization is attracting more attention nowadays with the widespread of location-based services. In- door navigation, child tracking, and location-based advertise- ments are common applications for indoor localization. WiFi fi ting is an indoor localization technique where the lo- cation is estimated by mapping the strength of the measured WiFi signals from diff t Access Points (APs) against a previ- ously collected database. It is widely adopted as being natively supported by the WiFi mobile devices without any additional costs. A major concern of this technique is that an attacker could easily change the strength of the received signals in or- der to fake the location of the mobile device. Here, we develop algorithms to identify the attacked APs and to make accurate localization in the presence of the attack. We evaluate the per- formance of our algorithms using diff t WiFi fi ting datasets under diff rent attack models. Experimental results show that the proposed algorithms are resistant to the applied attack models and can achieve more robust location estimation than other strategies.
Accurate indoor WiFi localization is attracting more attention nowadays with the widespread of location-based services. In- door navigation, child tracking, and location-based advertise- ments are common applications for indoor localization. WiFi fi ting is an indoor localization technique where the lo- cation is estimated by mapping the strength of the measured WiFi signals from diff t Access Points (APs) against a previ- ously collected database. It is widely adopted as being natively supported by the WiFi mobile devices without any additional costs. A major concern of this technique is that an attacker could easily change the strength of the received signals in or- der to fake the location of the mobile device. Here, we develop algorithms to identify the attacked APs and to make accurate localization in the presence of the attack. We evaluate the per- formance of our algorithms using diff t WiFi fi ting datasets under diff rent attack models. Experimental results show that the proposed algorithms are resistant to the applied attack models and can achieve more robust location estimation than other strategies.
Other data
| Title | Security of Cyber-Physical Infrastructure | Other Titles | أمان البنية التحتية للأنظمة المادية الألكترونية | Authors | Mona Alaa Mohi El Dien Abo El Naga | Issue Date | 2019 |
Recommend this item
Similar Items from Core Recommender Database
Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.