{"title":"Design and Analysis of Secure Localization Against Vulnerability-Induced Attack for Internet of Things","authors":"Guanghui Wang, Xiaolin Huang, Xueyuan Zhang, Geyuan Liu, Fang-Yuan Zuo","doi":"10.1109/ICCCWorkshops57813.2023.10233751","DOIUrl":null,"url":null,"abstract":"This paper investigates the problem of secure localization where the device vulnerabilities are used to perform adversarial attacks in the Internet of Things. Compared with existing work, a practical vulnerability-induced adversarial attack model is considered, where a malicious user is able to make use of vulnerable nodes to launch attacks, which may destroy the localization services or cause private location information leakage. To address the above issue, the Quality of Security (QoSec) is introduced to quantitatively describe the capability of anchor users to provide secure data. Based on the maximum path attack probability, the QoSec is calculated by taking into account the attack value, social value and device vulnerability. Furthermore, from the perspective of the anchor security assessments, this paper designs a Secure Localization (SLoc) algorithm through selecting the anchor users with high QoSec values. Theoretical analyses are performed to prove that the SLoc algorithm is secure, correct, and accurate. Experiments and simulations are conducted to demonstrate the superior performance of the SLoc algorithm and validate the analytical results.","PeriodicalId":201450,"journal":{"name":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCWorkshops57813.2023.10233751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates the problem of secure localization where the device vulnerabilities are used to perform adversarial attacks in the Internet of Things. Compared with existing work, a practical vulnerability-induced adversarial attack model is considered, where a malicious user is able to make use of vulnerable nodes to launch attacks, which may destroy the localization services or cause private location information leakage. To address the above issue, the Quality of Security (QoSec) is introduced to quantitatively describe the capability of anchor users to provide secure data. Based on the maximum path attack probability, the QoSec is calculated by taking into account the attack value, social value and device vulnerability. Furthermore, from the perspective of the anchor security assessments, this paper designs a Secure Localization (SLoc) algorithm through selecting the anchor users with high QoSec values. Theoretical analyses are performed to prove that the SLoc algorithm is secure, correct, and accurate. Experiments and simulations are conducted to demonstrate the superior performance of the SLoc algorithm and validate the analytical results.