TY - GEN
T1 - Defending Malicious Check-in Based on Access Point Selection for Indoor Positioning System
AU - Li, Weiwei
AU - Su, Zhou
AU - Zhang, Kuan
AU - Benslimane, Abderrahim
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - WiFi fingerprint-based positioning system emerges to offer fundamental location information for indoor mobile users. It facilitates the check-in to point of interest (POI) through submitting received signal strength (RSS) fingerprints in order to evaluate the crowd traffic. However, the crowd traffic evaluation with RSS fingerprints is vulnerable to the malicious check-in attacks. Attackers who are not at the target POI may still submit the self-modified RSS fingerprints located at the target POI in order to illegally increase its crowd traffic and eventually profit from this fake information. In this paper, we propose a defense scheme against malicious check-in based on access point (AP) selection to significantly reduce the success rate of fingerprint modification from attackers. Specifically, we first exploit fingerprint distance between POIs for AP selection. Then, we explore the mutual information between different POI classes to select APs with high robustness. In addition, the level set method (LSM) is developed to search the optimal modified fingerprint to assess attacker's costs. The extensive simulation results show that the proposed scheme can effectively resist attackers with high accuracy and facilitate crowd traffic evaluation of target POI according to the submitted RSS fingerprints.
AB - WiFi fingerprint-based positioning system emerges to offer fundamental location information for indoor mobile users. It facilitates the check-in to point of interest (POI) through submitting received signal strength (RSS) fingerprints in order to evaluate the crowd traffic. However, the crowd traffic evaluation with RSS fingerprints is vulnerable to the malicious check-in attacks. Attackers who are not at the target POI may still submit the self-modified RSS fingerprints located at the target POI in order to illegally increase its crowd traffic and eventually profit from this fake information. In this paper, we propose a defense scheme against malicious check-in based on access point (AP) selection to significantly reduce the success rate of fingerprint modification from attackers. Specifically, we first exploit fingerprint distance between POIs for AP selection. Then, we explore the mutual information between different POI classes to select APs with high robustness. In addition, the level set method (LSM) is developed to search the optimal modified fingerprint to assess attacker's costs. The extensive simulation results show that the proposed scheme can effectively resist attackers with high accuracy and facilitate crowd traffic evaluation of target POI according to the submitted RSS fingerprints.
KW - AP selection
KW - Crowd traffic evaluation.
KW - Fingerprint positioning
KW - Malicious check-in defense
UR - https://www.scopus.com/pages/publications/85089505069
U2 - 10.1109/ICC40277.2020.9149100
DO - 10.1109/ICC40277.2020.9149100
M3 - 会议稿件
AN - SCOPUS:85089505069
T3 - IEEE International Conference on Communications
BT - 2020 IEEE International Conference on Communications, ICC 2020 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 IEEE International Conference on Communications, ICC 2020
Y2 - 7 June 2020 through 11 June 2020
ER -