The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2011 vol.10)
pp: 449-462
Neal Patwari , University of Utah, Salt Lake City
Sneha K. Kasera , University of Utah, Salt Lake City
ABSTRACT
We investigate location distinction, the ability of a receiver to determine when a transmitter has changed location, which has application for energy conservation in wireless sensor networks, for physical security of radio-tagged objects, and for wireless network security in detection of replication attacks. In this paper, we investigate using a measured temporal link signature to uniquely identify the link between a transmitter (TX) and a receiver (RX). When the TX changes location, or if an attacker at a different location assumes the identity of the TX, the proposed location distinction algorithm reliably detects the change in the physical channel. This detection can be performed at a single RX or collaboratively by multiple receivers. We use 9,000 link signatures recorded at different locations and over time to demonstrate that our method significantly increases the detection rate and reduces the false alarm rate, in comparison to existing methods. We present a procedure to estimate the mutual information in link and link signature using the Edgeworth approximation. For the measured data set, we show that approximately 66 bits of link information is contained in each measured link signature.
INDEX TERMS
PHY layer, radio channel, measurements, location distinction.
CITATION
Neal Patwari, Sneha K. Kasera, "Temporal Link Signature Measurements for Location Distinction", IEEE Transactions on Mobile Computing, vol.10, no. 3, pp. 449-462, March 2011, doi:10.1109/TMC.2010.189
REFERENCES
[1] Sensing and Processing Across Networks (SPAN) Lab Website, http:/span.ece.utah.edu, 2010.
[2] I.A. Ahmad and P.E. Lin, "A Nonparametric Estimation of the Entropy for Absolutely Continuous Distributions," IEEE Trans. Information Theory, vol. 22, no. 3, pp. 372-375, May 1976.
[3] O.E. Barndorff-Nielsen and D.R. Cox, Inference and Asymptotics. Chapman & Hall, 1989.
[4] T. Burchfield and S. Venkatesan, "Accelerometer-Based Human Abnormal Movement Detection in Wireless Sensor Networks," Proc. First ACM Int'l Workshop Systems and Networking Support for Healthcare and Assisted Living Environments, pp. 67-69, 2007.
[5] G. Chandrasekaran, M. Ergin, M. Gruteser, R. Martin, J. Yang, and Y. Chen, "DECODE: Detecting Co-Moving Wireless Devices," Proc. Fifth IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '08), pp. 315-320, 2008.
[6] Y. Chen, W. Trappe, and R.P. Martin, "Detecting and Localizing Wireless Spoofing Attacks," Proc. IEEE Comm. Soc. Conf. Sensor Mesh and Ad Hoc Comm. and Networks (SECON '07), pp. 193-202, 2007.
[7] W.J. Conover, Practical Nonparametric Statistics. John Wiley & Sons, 1971.
[8] J.A. Costa and A.O. HeroIII, "Geodesic Entropic Graphs for Dimension and Entropy Estimation in Manifold Learning," IEEE Trans. Signal Processing, vol. 52, no. 8, pp. 2210-2221, Aug. 2004.
[9] T. Cover and J.A. Thomas, Elements of Information Theory. John Wiley & Sons, 1991.
[10] D.E. Denning and P.F. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Computer Fraud and Security, pp. 12-16, Feb. 1996.
[11] B. Efron and R. Tibshirani, An Introduction to the Bootstrap. Chapman & Hall, 1997.
[12] D.B. Faria and D.R. Cheriton, "No Longterm Secrets: Location-Based Security in Overprovisioned Wireless LANs," Proc. Third ACM Workshop Hot Topics in Networks (HotNets-III), Nov. 2004.
[13] D.B. Faria and D.R. Cheriton, "Radio-Layer Security: Detecting Identity-Based Attacks in Wireless Networks Using Signalprints," Proc. Workshop Wireless Security (WiSe '06), pp. 43-52, Sept. 2006.
[14] B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, "Improving Wireless Privacy with an Identifier-Free Link Layer Protocol," Proc. ACM MobiSys, pp. 40-53, 2008.
[15] M. Gruteser and D. Grunwald, "Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005.
[16] W.E. Guthrie, J. Joseph, and F. Pappadia, "Tagging System Using Motion Detector," US Patent 5 844 482, Dec. 1998.
[17] H. Hashemi, "The Indoor Radio Propagation Channel," Proc. IEEE, vol. 81, no. 7, pp. 943-968, July. 1993.
[18] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Proc. Network and Distributed System Security Symp. (NDSS '04), pp. 45-57, Feb. 2004.
[19] A. Hyvärinen, "Survey on Independent Component Analysis," Neural Computing Surveys, vol. 2, pp. 94-128, 1999.
[20] S.M. Kay, Fundamentals of Statistical Signal Processing. Prentice Hall, 1993.
[21] T. Kohno, A. Broido, and K.C. Claffy, "Remote Physical Device Fingerprinting," Proc. IEEE Symp. Security and Privacy, pp. 211-225, 2005.
[22] L. Kozachenko and N.N. Leonenko, "Sample Estimate of the Entropy of a Random Vector," Problems of Information Transmission, vol. 23, no. 2, pp. 95-101, 1987.
[23] E.G. Larsson, G. Liu, J. Li, and G.B. Giannakis, "Joint Symbol Timing and Channel Estimation for OFDM Based WLANs," IEEE Comm. Letters, vol. 5, no. 8, pp. 325-327, Aug. 2001.
[24] L. Lazos and R. Poovendran, "SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks," Proc. ACM Workshop Wireless Security (WiSe '04), pp. 21-30, 2004.
[25] Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing Wireless Systems via Lower Layer Enforcements," Proc. ACM Workshop Wireless Security (WiSe '06), pp. 33-42, Sept. 2006.
[26] D. Murray and A. Basu, "Motion Tracking with an Active Camera," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 16, no. 5, pp. 449-459, May 1994.
[27] N. Patwari, utah/CIR (v. 2007-09-10) dataset, http://crawdad.cs. dartmouth.edu/meta.php?name=utah CIR, 2009.
[28] N. Patwari, A.O. HeroIII, M. Perkins, N. Correal, and R.J. O'Dea, "Relative Location Estimation in Wireless Sensor Networks," IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2137-2148, Aug. 2003.
[29] N. Patwari and S.K. Kasera, "Robust Location Distinction Using Temporal Link Signatures," Proc. ACM MobiCom, Sept. 2007.
[30] J.G. Proakis and M. Salehi, Communication System Engineering, second ed. Prentice Hall, 2002.
[31] D. Qiao and S. Choi, "New 802.11h Mechanisms Can Reduce Power Consumption," IEEE IT Professional, vol. 8, no. 2. pp. 43-48, Mar./Apr. 2006.
[32] J.M. Rabaey, M.J. Ammer, J.L. da SilvaJr., D. Patel, and S. Roundy, "Picoradio Supports Ad Hoc Ultra-Low Power Wireless Networking," IEEE Computer, vol. 33, no. 7, pp. 42-48, July 2000.
[33] T.S. Rappaport, Wireless Communications: Principles and Practice. Prentice-Hall, 1996.
[34] J.R. Smith, K.P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A.D. Rea, S. Roy, and K. Sundara-Rajan, "RFID-Based Techniques for Human-Activity Detection," Comm. ACM, vol. 48, no. 9, pp. 39-44, 2005.
[35] A.M. Tekalp, Digital Video Processing. Prentice-Hall, 1995.
[36] M. Torlak and G. Xu, "Blind Multiuser Channel Estimation in Asynchronous CDMA Systems," IEEE Trans. Signal Processing, vol. 45, no. 1, pp. 137-147, Jan. 1997.
[37] M.M. Van Hulle, "Edgeworth Approximation of Multivariate Differential Entropy," Neural Computation, vol. 17, no. 9, pp. 1903-1910, 2005.
[38] K. Woyach, D. Puccinelli, and M. Haenggi, "Sensorless Sensing in Wireless Networks: Implementation and Measurements," Proc. Int'l Symp. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, Apr. 2006.
[39] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication," Proc. IEEE Int'l Conf. Comm. (ICC '07), pp. 4646-4651, June 2007.
[40] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "A Physical-Layer Technique to Enhance Authentication for Mobile Terminals," Proc. IEEE Int'l Conf. Comm. (ICC '08), pp. 1520-1524, May 2008.
[41] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "MIMO-Assisted Channel-Based Authentication in Wireless Networks," Proc. Conf. Information Sciences and Systems (CISS '08), pp. 642-646, Mar. 2008.
[42] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in Time-Variant Channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, July 2008.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool