Attack Tolerance of RSS-based Fingerprinting

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    4 Citations (Scopus)
    70 Downloads (Pure)


    This paper studies the performance of Received Signal Strength (RSS)-based
    fingerprinting positioning methods under different attack scenarios. We discuss
    different attack models and we compare the accuracy of a commonly used RSS
    fingerprinting algorithm with a robust version relying on access node
    visibility, with respect to those attacks. The results show that the robust
    fingerprinting method does not outperform the traditional fingerprinting method
    for most attacks, nevertheless, for a few attack types the accuracy
    improvement, in terms of Root Mean Square Error (RMSE), can yield factor two.
    RSS-based fingerprinting methods are most vulnerable to jamming, spoofing and
    interchanging of access nodes and least vulnerable to random removal of access
    Original languageEnglish
    Title of host publicationIEEE Wireless Communications and Networking Conference (WCNC)
    ISBN (Electronic)978-1-5386-4068-5
    Publication statusPublished - 15 Apr 2018
    Publication typeA4 Article in conference proceedings
    EventIEEE Wireless Communications and Networking Conference -
    Duration: 1 Jan 1900 → …

    Publication series

    ISSN (Print)1558-2612


    ConferenceIEEE Wireless Communications and Networking Conference
    Period1/01/00 → …

    Publication forum classification

    • Publication forum level 1


    Dive into the research topics of 'Attack Tolerance of RSS-based Fingerprinting'. Together they form a unique fingerprint.

    Cite this