Tampere University of Technology

TUTCRIS Research Portal

Attack Tolerance of RSS-based Fingerprinting

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference (WCNC)
PublisherIEEE
ISBN (Electronic)978-1-5386-4068-5
DOIs
Publication statusPublished - 15 Apr 2018
Publication typeA4 Article in a conference publication
EventIEEE Wireless Communications and Networking Conference -
Duration: 1 Jan 1900 → …

Publication series

Name
ISSN (Print)1558-2612

Conference

ConferenceIEEE Wireless Communications and Networking Conference
Period1/01/00 → …

Abstract

This paper studies the performance of Received Signal Strength (RSS)-based
fingerprinting positioning methods under different attack scenarios. We discuss
different attack models and we compare the accuracy of a commonly used RSS
fingerprinting algorithm with a robust version relying on access node
visibility, with respect to those attacks. The results show that the robust
fingerprinting method does not outperform the traditional fingerprinting method
for most attacks, nevertheless, for a few attack types the accuracy
improvement, in terms of Root Mean Square Error (RMSE), can yield factor two.
RSS-based fingerprinting methods are most vulnerable to jamming, spoofing and
interchanging of access nodes and least vulnerable to random removal of access
nodes.

Publication forum classification

Downloads statistics

No data available