Tampere University of Technology

TUTCRIS Research Portal

Attack Tolerance of RSS-based Fingerprinting

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review


Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference (WCNC)
ISBN (Electronic)978-1-5386-4068-5
Publication statusPublished - 15 Apr 2018
Publication typeA4 Article in a conference publication
EventIEEE Wireless Communications and Networking Conference -
Duration: 1 Jan 1900 → …

Publication series

ISSN (Print)1558-2612


ConferenceIEEE Wireless Communications and Networking Conference
Period1/01/00 → …


This paper studies the performance of Received Signal Strength (RSS)-based
fingerprinting positioning methods under different attack scenarios. We discuss
different attack models and we compare the accuracy of a commonly used RSS
fingerprinting algorithm with a robust version relying on access node
visibility, with respect to those attacks. The results show that the robust
fingerprinting method does not outperform the traditional fingerprinting method
for most attacks, nevertheless, for a few attack types the accuracy
improvement, in terms of Root Mean Square Error (RMSE), can yield factor two.
RSS-based fingerprinting methods are most vulnerable to jamming, spoofing and
interchanging of access nodes and least vulnerable to random removal of access

Publication forum classification

Downloads statistics

No data available