Tampere University of Technology

TUTCRIS Research Portal

Attack Tolerance of RSS-based Fingerprinting

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Standard

Attack Tolerance of RSS-based Fingerprinting. / Richter, Philipp; Valkama, Mikko; Lohan, Elena-Simona.

IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Harvard

Richter, P, Valkama, M & Lohan, E-S 2018, Attack Tolerance of RSS-based Fingerprinting. in IEEE Wireless Communications and Networking Conference (WCNC). IEEE, IEEE Wireless Communications and Networking Conference, 1/01/00. https://doi.org/10.1109/WCNC.2018.8376977

APA

Richter, P., Valkama, M., & Lohan, E-S. (2018). Attack Tolerance of RSS-based Fingerprinting. In IEEE Wireless Communications and Networking Conference (WCNC) IEEE. https://doi.org/10.1109/WCNC.2018.8376977

Vancouver

Richter P, Valkama M, Lohan E-S. Attack Tolerance of RSS-based Fingerprinting. In IEEE Wireless Communications and Networking Conference (WCNC). IEEE. 2018 https://doi.org/10.1109/WCNC.2018.8376977

Author

Richter, Philipp ; Valkama, Mikko ; Lohan, Elena-Simona. / Attack Tolerance of RSS-based Fingerprinting. IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018.

Bibtex - Download

@inproceedings{1d5e2bef54da4f4181d05ceda3275179,
title = "Attack Tolerance of RSS-based Fingerprinting",
abstract = "This paper studies the performance of Received Signal Strength (RSS)-basedfingerprinting positioning methods under different attack scenarios. We discussdifferent attack models and we compare the accuracy of a commonly used RSSfingerprinting algorithm with a robust version relying on access nodevisibility, with respect to those attacks. The results show that the robustfingerprinting method does not outperform the traditional fingerprinting methodfor most attacks, nevertheless, for a few attack types the accuracyimprovement, in terms of Root Mean Square Error (RMSE), can yield factor two.RSS-based fingerprinting methods are most vulnerable to jamming, spoofing andinterchanging of access nodes and least vulnerable to random removal of accessnodes.",
author = "Philipp Richter and Mikko Valkama and Elena-Simona Lohan",
year = "2018",
month = "4",
day = "15",
doi = "10.1109/WCNC.2018.8376977",
language = "English",
publisher = "IEEE",
booktitle = "IEEE Wireless Communications and Networking Conference (WCNC)",

}

RIS (suitable for import to EndNote) - Download

TY - GEN

T1 - Attack Tolerance of RSS-based Fingerprinting

AU - Richter, Philipp

AU - Valkama, Mikko

AU - Lohan, Elena-Simona

PY - 2018/4/15

Y1 - 2018/4/15

N2 - This paper studies the performance of Received Signal Strength (RSS)-basedfingerprinting positioning methods under different attack scenarios. We discussdifferent attack models and we compare the accuracy of a commonly used RSSfingerprinting algorithm with a robust version relying on access nodevisibility, with respect to those attacks. The results show that the robustfingerprinting method does not outperform the traditional fingerprinting methodfor most attacks, nevertheless, for a few attack types the accuracyimprovement, in terms of Root Mean Square Error (RMSE), can yield factor two.RSS-based fingerprinting methods are most vulnerable to jamming, spoofing andinterchanging of access nodes and least vulnerable to random removal of accessnodes.

AB - This paper studies the performance of Received Signal Strength (RSS)-basedfingerprinting positioning methods under different attack scenarios. We discussdifferent attack models and we compare the accuracy of a commonly used RSSfingerprinting algorithm with a robust version relying on access nodevisibility, with respect to those attacks. The results show that the robustfingerprinting method does not outperform the traditional fingerprinting methodfor most attacks, nevertheless, for a few attack types the accuracyimprovement, in terms of Root Mean Square Error (RMSE), can yield factor two.RSS-based fingerprinting methods are most vulnerable to jamming, spoofing andinterchanging of access nodes and least vulnerable to random removal of accessnodes.

U2 - 10.1109/WCNC.2018.8376977

DO - 10.1109/WCNC.2018.8376977

M3 - Conference contribution

BT - IEEE Wireless Communications and Networking Conference (WCNC)

PB - IEEE

ER -