Characterization and detection of location spoofing attacks

@article{Lee2012CharacterizationAD,
  title={Characterization and detection of location spoofing attacks},
  author={Jeong Heon Lee and R. Michael Buehrer},
  journal={Journal of Communications and Networks},
  year={2012},
  volume={14},
  pages={396-409}
}
With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate through signal strength based attacks. Since the physical-layer approach identifies and assesses the security risk of position information based solely… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-9 of 9 extracted citations

Source Location with Quantized Sensor Data Corrupted by False Information

2018 21st International Conference on Information Fusion (FUSION) • 2018
View 4 Excerpts
Highly Influenced

Infrasonic scene fingerprinting for authenticating speaker location

2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 34 references

Design of measurement-based correlation models for shadow fading

The 2010 International Conference on Advanced Technologies for Communications • 2010

Location Estimation Using Differential RSS with Spatially Correlated Shadowing

GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference • 2009
View 1 Excerpt

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

IEEE INFOCOM 2008 - The 27th Conference on Computer Communications • 2008

Detecting sybil attacks inwireless and sensor networks using cluster analysis

2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems • 2008
View 1 Excerpt

GPS ‘ spoo fi ng ’ could threaten national security

E. Bland.
2008

Similar Papers

Loading similar papers…