In-region location verification (IRLV) aims at securely verifying that a wireless device is in a given region of interest (ROI), e.g., an authorized area where specific services can be provided. We consider an IRLV system that verifies the position through the estimated attenuations of the wireless channels connecting the device to the access points (APs) of the IRLV network. We propose techniques that can be used by an attacker located outside the ROI in order to break the IRLV system and let the network believe that he is inside the ROI. This is achieved either by transmitting from positions outside the ROI exhibiting wireless channel characteristics similar to inner positions (passive attack), or by directly inducing desired estimated channel attenuations at the APs, i.e., suitably transmitting signals with multiple antennas (active attacks). In both cases, we aim at minimizing the number of attack attempts before the first successful attack. To this end we consider ranking solutions based on machine learning (ML), where the attacker ranks random candidate attacks according to metrics related their success, and then performs attacks according to the ranking.

Ranking-based attacks to in-region location verification systems

A. Brighente;F. Formaggio;G. Ruvoletto;S. Tomasin
2019

Abstract

In-region location verification (IRLV) aims at securely verifying that a wireless device is in a given region of interest (ROI), e.g., an authorized area where specific services can be provided. We consider an IRLV system that verifies the position through the estimated attenuations of the wireless channels connecting the device to the access points (APs) of the IRLV network. We propose techniques that can be used by an attacker located outside the ROI in order to break the IRLV system and let the network believe that he is inside the ROI. This is achieved either by transmitting from positions outside the ROI exhibiting wireless channel characteristics similar to inner positions (passive attack), or by directly inducing desired estimated channel attenuations at the APs, i.e., suitably transmitting signals with multiple antennas (active attacks). In both cases, we aim at minimizing the number of attack attempts before the first successful attack. To this end we consider ranking solutions based on machine learning (ML), where the attacker ranks random candidate attacks according to metrics related their success, and then performs attacks according to the ranking.
2019
Proc. IEEE Int. Workshop on Information Forensics and Security (WIFS),
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3329434
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact