TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

Attack Tolerance of RSS-based Fingerprinting

Tutkimustuotosvertaisarvioitu

Yksityiskohdat

AlkuperäiskieliEnglanti
OtsikkoIEEE Wireless Communications and Networking Conference (WCNC)
KustantajaIEEE
ISBN (elektroninen)978-1-5386-4068-5
DOI - pysyväislinkit
TilaJulkaistu - 15 huhtikuuta 2018
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisussa
TapahtumaIEEE Wireless Communications and Networking Conference -
Kesto: 1 tammikuuta 1900 → …

Julkaisusarja

Nimi
ISSN (painettu)1558-2612

Conference

ConferenceIEEE Wireless Communications and Networking Conference
Ajanjakso1/01/00 → …

Tiivistelmä

This paper studies the performance of Received Signal Strength (RSS)-based
fingerprinting positioning methods under different attack scenarios. We discuss
different attack models and we compare the accuracy of a commonly used RSS
fingerprinting algorithm with a robust version relying on access node
visibility, with respect to those attacks. The results show that the robust
fingerprinting method does not outperform the traditional fingerprinting method
for most attacks, nevertheless, for a few attack types the accuracy
improvement, in terms of Root Mean Square Error (RMSE), can yield factor two.
RSS-based fingerprinting methods are most vulnerable to jamming, spoofing and
interchanging of access nodes and least vulnerable to random removal of access
nodes.

Latausten tilastot

Ei tietoja saatavilla