Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks

نویسندگان

  • Christine Laurendeau
  • Michel Barbeau
چکیده

A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital signature. In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting power utilized to carry out an exploit. Hyperbolic position bounding (HPB) provides a mechanism to probabilistically estimate the candidate location of an attack message’s originator using received signal strength (RSS) reports, without assuming knowledge of the transmitting power. We specialize the applicability of HPB into the realm of vehicular networks and provide alternate HPB algorithms to improve localization precision and computational efficiency. We extend HPB for tracking the consecutive locations of a mobile attacker. We evaluate the localization and tracking performance of HPB in a vehicular scenario featuring a variable number of receivers and a known navigational layout. We find that HPB can position a transmitting device within stipulated guidelines for emergency services localization accuracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Localization and Tracking of Mobile Attackers Using Hyperbolic Position Bounding in Vehicular Networks

A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution by authenticating its messages with untraceable credentials. Hyperbolic position bounding (HPB) provides a mechanism to probabilistically estimate the candidate location of an attack message’s originator using received signal strength (RSS) reports, without knowledge of the transm...

متن کامل

Probabilistic Evidence Aggregation for Malicious Node Position Bounding in Wireless Networks

Hyperbolic position bounding of malicious devices aims to estimate the location of a wireless network rogue insider that transmits an attack message containing falsified information to mislead honest nodes. A probabilistic path loss model is used to construct an area in Euclidian space bounded by minimum and maximum distance difference hyperbolas between each pair of trusted receivers. This hyp...

متن کامل

Compounding Probabilistic Evidence for Hyperbolic Rogue Location Estimation

Hyperbolic position bounding of malicious devices aims to estimate the location of a wireless network rogue insider that transmits an attack message containing falsified information to mislead honest nodes. A probabilistic path loss model is used to construct an area in Euclidian space bounded by minimum and maximum distance difference hyperbolas between each pair of trusted receivers. This hyp...

متن کامل

Malicious Node Position Bounding in Mobile WiFi/802.11 Networks

Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path loss model is used to construct a probable distance difference range between a rogue transmitter and a pair of trusted receivers. Hyperbolas are constructed at the minimum and maximum bounds of this range to delineate t...

متن کامل

Distributed Position Localization and Tracking (DPLT) of Malicious Nodes in Cluster Based Mobile Ad hoc Networks (MANET)

In this paper, a robust distributed malicious node detection and precise localization and tracking method is proposed for Cluster based Mobile Ad hoc Network (MANET). Certificate Authority (CA) node is selected as the most stable node among trusted nodes, surrounded by Registration Authority nodes (RAs) in each cluster to generate the Dynamic Demilitarized Zone (DDMZ) to defend CA from probable...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Wireless Comm. and Networking

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009