TY - GEN
T1 - The directional attack on wireless localization - or - How to spoof your location with a tin can
AU - Bauer, Kevin
AU - McCoy, Damon
AU - Anderson, Eric
AU - Breitenbach, Markus
AU - Grudic, Greg
AU - Grunwald, Dirk
AU - Sicker, Douglas
PY - 2009
Y1 - 2009
N2 - 802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show that these localization techniques are vulnerable to non-cryptographic attacks where an adversary uses a low-cost directional antenna to appear from the localization algorithm's perspective to be in another arbitrary location of their choosing. The attacker's ability to actively influence where they are positioned is a key distinguishing feature of the directional attack relative to prior localization attacks that use transmit power control to introduce localization errors. We implement a representative set of received signal strength-based localization algorithms and evaluate the attack in a real office building environment. To mitigate the attack's effectiveness, we develop and evaluate an attack detection scheme that offers a high detection rate with few false positives.
AB - 802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show that these localization techniques are vulnerable to non-cryptographic attacks where an adversary uses a low-cost directional antenna to appear from the localization algorithm's perspective to be in another arbitrary location of their choosing. The attacker's ability to actively influence where they are positioned is a key distinguishing feature of the directional attack relative to prior localization attacks that use transmit power control to introduce localization errors. We implement a representative set of received signal strength-based localization algorithms and evaluate the attack in a real office building environment. To mitigate the attack's effectiveness, we develop and evaluate an attack detection scheme that offers a high detection rate with few false positives.
UR - http://www.scopus.com/inward/record.url?scp=77951524528&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77951524528&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2009.5425737
DO - 10.1109/GLOCOM.2009.5425737
M3 - Conference contribution
AN - SCOPUS:77951524528
SN - 9781424441488
T3 - GLOBECOM - IEEE Global Telecommunications Conference
BT - GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
T2 - 2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
Y2 - 30 November 2009 through 4 December 2009
ER -