Keywords

1 Introduction

Nowadays, the widespread of mobile devices allowed indoor positioning systems to receive greater attention [1]. IPSs have successfully integrated in different areas including health, assets tracking, child safety [2] and industry [3]. The systems detect the location of objects or humans in closed environment where satellite signals are unavailable or inaccurate. Moreover, GPS cannot be used for indoor positioning due to signal scattering, attenuation, and for the wide marginal error which can be bigger than the space itself. IPSs use two different nodes, the mobile-node and anchor-node. The anchor-nodes give reference points to detect location (e.g. Access Point) [4]. Implementing IPSs using RF can reduce the cost by reusing the existing network infrastructure. If the cost and deployment speed are the main consideration, then it is better to use the existing WLAN infrastructure. However, RFID and Bluetooth IPSs have better precision and accuracy [5]. Hybrid infrastructure can be used to improve the quality of the system [6].

Wireless signals weaken while traveling over space, IPSs use different methods to estimate nodes location. Received Signal Strengths (RSS) method determines distance between transmitter and receiver by evaluating signal strength at receiving point. RSS based localization is susceptible to localization error caused by low-cost antenna which is used by adversary [7], statistical-test of variance is proposed to overcome this issue. Proximate method uses grid of base stations with pre-defined location. When a mobile-node in range of known base-station, then the location will be approximated. If mobile-node is in range of multiple base-stations, then the strongest signal will be considered. Time of arrival (TOA) method calculates the propagation time of a radio waves from one transmitter to another receiver, it provides a circle of possible location in two-dimensional space. The center of the circle is the base station, and the radius is the calculated distance [8], as shown in (Fig. 1). This technique requires accurate knowledge of transmission time and confirm that all base stations and mobile nodes are accurately synchronized with precise timing source [9]. Time Difference of Arrival (TDOA) method measures the difference time of arrival of the signal emitted by multiple base stations [10] (see Fig. 2). Three base stations create two TDOAs (L1 and L2), the intersection points between L1 and L2 estimates the location of the mobile-node. TDOA needs correct time reference between the measuring units.

Fig. 1.
figure 1

Time of arrival concept (TOA)

Fig. 2.
figure 2

Time difference of arrival concept

Angle of Arrival-AOA method determines the direction of RF signal when emitting from the antenna, this requires at least two angles to detect location. AOA is more complex and needs more expensive hardware. Fingerprinting technique determines the location by analyzing scene and compare it with the existing database. It consists of two stages: the first stage, offline stage, survey the area to collect location features and build the matching database. Location features include coordinates, and signals strength from adjacent base station. The second stage, online stage, will compare the current signal features with the database. There are several fingerprinting algorithms including: probabilistic methods, support vector machine (SVM), neural networks, k-nearest-neighbor (kNN), and smallest M-vertex polygon (SMP) [2].

IPS had been discussed by the research community from different perspectives. For instance, some researchers described the IPS in terms of implementation technologies and use, such as research paper [3, 16]. While [11] presented the IPSs from the performance perspective by comparing different performance measurements such as: accuracy, electricity consumption and coverage range. Visible LED Lighting IPSs have great potential in future due to its low cost, security and high throughput. The research paper [12] surveyed VLC IPSs and discussed systems characteristics, positioning algorithms, and performance. However, few scholars highlighted the security threats and countermeasure aspects in indoor positing systems. Therefore, this paper aims to fill this gap by providing an integrated view of IPS from the security perspective.

2 IPS Network Infrastructure

This section will give a brief introduction of different IPS network infrastructures:

RFID IPS requires micro-circuit, antenna, and RFID reader, system can be passive or active [13]. Passive systems are reflectors. Therefore, it consumes less power than active, and does not require a power source in the mobile node. Active RFID tags are transceiver, it transmits its identification information and signal received from the reader [14]. RFID gives better accuracy and higher precision, it can be 50% precise in the distance of 1 m and accurate for a range less than 2 m. However, it is more complex and requires dense environment of RFID devices.

UWB uses sub-nanosecond radio pulses to send data in a wide range of bandwidth. It can use limited transmission power as restricted by FCC. This technology can be classified as: (1) Impulse Radio (IR-UWB) or (2) carrier-based UWB system. The first system sends narrow pulses with smooth transition (base-band). The second system, carrier based UWB is more complex design, although it is more flexible in selecting frequency [15]. UWB measures the node position using TDOA of the radio frequency signals [16].

Bluetooth IPSs can use two different approaches in defining the position. The first approach is based on proximity and RSS ranging techniques, the second approach is based on applying geometric calculation [5]. Although, geometric calculation is more accurate, it is considered more complex and prone to calculation errors. The low cost of Bluetooth chipset can reduce the price of positioning system implementation.

Visible Light Communication (VLC) is a LED-based IPSs that use visible light signals to transmit data, the installed LED-lamps on the ceiling will act as anchor nodes. VLC uses IEEE 802.15.7 standard and can give highly accurate location with a minimum calculation error [17]. This method found to be the most appropriate one [18]. In the system design, each LED-light will get unique address which represent its coordinate and the unique ID. The receiving nodes will forward the LED-ID to application service to determine location. VLC IPS can use proximate, triangulation or fingerprinting for positioning. The technology has several advantages: it is cost effective due to low energy consumption, longer life expectancy, and reusing the existing lighting system in the building. It does not produce electromagnetic interference, and therefore it is suitable where RF signal is prohibited, VLC is more secure as light cannot penetrate walls, and thus independent systems can be installed in different rooms smoothly. However, the technology is susceptible to different difficulties including: ambient Light, time measurement error, flickering and lens distortion [19]. Moreover, synchronization between LED-lights anchor nodes and mobile devices is very difficult to achieve [20].

WLAN IPSs which reuse the existing network infrastructure will reduce cost, however, WLAN IPS that is based on RSSI localization technique suffer from instability of the signal strength, therefore this system does not have high accuracy and precision. The accuracy of WLAN positioning system that utilizing RSS technique is approximately 1 to 5 m and the precision about 50% in 2 m [5]. Two approaches proposed to reduce errors: mono-objective and multi-objective approaches, both are based on variable neighbor search [6].

ZigBee defines higher level communication protocols that delivers network, security, and application support services operating on top of 802.15.4 standard for personal area network [21]. It is designed for small scale devices that require reliable wireless communication with low data transmission rate and low power consumption. ZigBee network consists of three types of devices coordinator, router, and end nodes [22]. ZigBee positioning systems are simple and operate using low power technology [23].

3 Secure Localization Services

Security is a crucial element when developing any information system, the next section discusses common attacks that would endanger IPSs, available countermeasures and the ability of localization algorithms to defeat the discussed threats.

3.1 Common Attacks

  1. 1.

    False Node: the insertion of additional node to the system. It can be used to propagate fake information or to prevent processing of legitimate signals.

  2. 2.

    Spoofing: a dishonest node impersonates the identity of legitimate base-station, this would persuade other nodes to believe that it is in a different location. Adversary can spoof management and control frame which can have huge impact on the network [24]. Spoofing can be the first step of DoS or injection attack.

  3. 3.

    Sinkhole: is an insider attack where malicious node tries to attract all neighboring node to establish connection with it, then it will attract all traffic from one area [25].

  4. 4.

    Sybil: attacker obtains several nodes identities, then use these identities to deceive other nodes. The compromised nodes identities can be replicated to several locations in the network and cause erroneous information [26].

  5. 5.

    Replay: involves storing the packets to re-sending then late, this cause the neighboring nodes to believe that the packet is authentic as it is a copy of the original. In this attack, the adversary first will jam the transmission between sender and receiver and will replay the packets in the future and claim that he is the sender [27].

  6. 6.

    Wormholes: malicious node records packet at one side of the network and re-transmit and replicate it by another malicious node on the side of the network, this can be done by adding virtual tunnel which has a low latency link [28].

  7. 7.

    Hello flood: the malicious node floods the network with hello message with increased power, and that will confuse the routine protocol and the victim node will try to refer to the adversary for localization service [28].

  8. 8.

    Denial of Service: DOS attack tries to stop the service by flooding the network with traffics that consume all available resources and deny legitimate nodes from benefit from the service. The attacker can inject bogus broadcast packet and force network nodes to complete expensive signature verification or packet forwarding broadcast authentication [29] which will result denying the service. DOS can occur at any layer of network model as illustrated in Table 1.

    Table 1. Denial-of-Service attack at each layer of the network

3.2 Security Countermeasure

Security Through Cryptography: Malicious nodes can claim the identity of another legitimate entity and then alters the packet contents, this can be eliminated using cryptography and authentication. However, cryptography can only protect from external attacks and cannot defeat dishonest node that sends wrong positioning data. In addition, crypto-system requires additional resources, e.g. better processing speed and larger memory, and most of sensory devices has limited computational power. Therefore, most of secure localization algorithms use non-cryptographic security mechanism [30].

Misbehavior Detection and Blocking: This countermeasure technique involves monitoring nodes behavior over time to decide whether to trust them or not. Any information gathered from untrusted source will be ignored accordingly. To detect malicious node, Liu et al. [31] proposed two different methods. Method 1 compares the estimated distance of the beacon nodes with the average estimated distance of the signal (e.g., AoA, TDoA). If the distance between them is larger than the maximum distance error, then the received beacon is malicious. Method 2 can protect against replay attack and sinkhole, by introducing the idea that malicious beacon will need more time. Mainly, it examines the Round-Trip Time (RTT) between two neighbor nodes and try to detect if it differs significantly from the (RTT) range derived from monitoring network behavior. DRBT [32] proposed blocking untrusted nodes by allowing each base station to monitor the area and contribute in building trust table.

Detecting Location Using Statistical Method: Every anchor node has a specific location in the grid of cells. To determine the location of mobile-node, neighboring anchor-nodes can vote for the location, then the center of the most voted cell can be used as location. If malicious node sends a forgery data, it can be detected by comparing it with the context of the other cells. Another statistical method is using Minimum Mean Squared Estimation (MMSE) [33]. This will verify if the estimated position is derived from consistent reference. If inconsistent sensor detected it will be revoked, and the node position will be calculated over again. This process will be repeated until all inconsistent nodes revoked. RRB-ScLoc proposed secure localization based on weighted square [34].

Counter Measure Hello-Flood Attack: Anchor nodes at wireless positioning networks are required to broadcast hello message to announce themselves to neighboring nodes. Attacker might inject the network with false hello packets, there are some methods to protect from hello flood attack including multi-path and multi based station data forwarding as described in [35], in this technique each node maintains a number of secret keys which can be used to transmit data to several routes. Another algorithm proposed an enhanced method to protect from Hello flood attack using client puzzle key. This will use a number that constitute a puzzle key, and it will be used to verify the validity of a node. The puzzle key difficulty will be increased when the node sends larger number of hello message (Puzzle difficulty ∝ Number of hello messages). Therefore, the node that send a fewer number of hello messages, will be processed first [36].

3.3 Secure Localization Algorithms

This section will discuss different secure localization algorithms.

SeRLoc [37]: Secure range independent localization for wireless sensor networks proposed by Lazos and Poovendran. SeRLoc uses two types of nodes mobile nodes (N) and Locators (L). Locators use omnidirectional antenna and mobile nodes can get location by analyzing signal emitted from locators. Locator propagates its coordinate and the angels of the antenna boundary line. Adversary needs to impersonate multiple beacons to compromise the system. SeRloc is range-free and distributer mechanism, it is robust against wormhole, impersonate and Sybil attacks. To improve localization accuracy, additional locator nodes must be installed or more directional antenna [38]. SeRLoc assumes that that no jamming of wireless medium will occur, and it cannot protect from attacks that target locator’s information [27].

HiRLoc [39]: In this model, node detect its location passively without increasing the number of reference points. The node determines location by intersection beacon-frames in the coverage area with multiple reference points. HiRLoc is immune to Sybil attack, wormhole attack, false beaconing and impersonating. HiRLoc utilizes two properties: antenna orientation and communication range. This system uses cryptographic primitives to secure beaconing frames. GSK (Global symmetric key) is used to encrypt beacons frames. HiRLoc has better accuracy than SeRolc, whereas nodes receive multiple beaconing frames from different locators [38]. However, it causes more computation and communication overhead.

SPINE [40]: This system obtains location based on Verifiable Multilateration (VM), the system measures the propagation time of radio signal by examining at least three anchor nodes which provide a robust estimation. SPINE is immune to wormhole, jamming and spoofing attack. It also can prevent dishonest node from distribution fake location. Nodes in SPINE cannot produce wrong distance measurement. Although, SPINE requires a high number of reference points, and it can also cause a bottle-neck in the system [38].

ROPE [41]: This system uses location verification mechanism before the data collection phase which allow the nodes to detect their location without using centralized computation. The system defines two different types of nodes: sensors which equipped with omnidirectional antenna and locators which equipped with M-directional antenna. Every sensory node shares a pairwise key with every locator. To decrease storage size, pairwise keys are derived from master key. ROPE is a robust localization system, it is immune to traffic jamming, spoofing and Sybil attack. It is also resistant to wormhole attack.

DRBTS [32]: Distributed Reputation-based Beacon Trust System aims to exclude malicious beaconing nodes that propagate false location information to the network. The model assumes that every beaconing node monitor its first-hope neighbor to inspect any misbehaving beaconing frame, and then updates the reputation of the neighboring nodes to (NRT) neighbor’s reputation table. This table will be used to either trust or reject broadcasted beacon frame based on the voting scheme. The robustness of the DRBTS system enhanced with increasing the number of beacon nodes. The system enables the network to find out which nodes can be trusted when determining the location. DRBTS can protect the network from impersonating, range changing and false beaconing frame.

The next Tables 2 and 3 will compare all the above localization algorithms using different factors such as behavior, robustness, disadvantages and the immunity to different threats.

Table 2. Secure Localization Algorithms overcoming security threats
Table 3. Secure localization systems comparison

4 Conclusion

In this research paper, Indoor Positioning Systems had been presented from different security aspects and security countermeasures were discussed. The paper highlighted several security threats that would affect the success of the IPSs significantly.

It had been found that Cryptographic techniques are difficult to implement for real-time systems due to the high computational overhead and hardware requirements such as large primary memory. Therefore, it is important to find alternative methods that would provide secured IPS without relying on cryptography only. The paper compares various secure localization algorithms. The comparison integrated different criteria’s such as cryptography, detection behavior, advantages, additional requirements, etc. Each presented threat had been mapped to secure localization algorithm, helping in defining the best algorithm that could be adopted in IPSs. For instance, the security algorithm which could be used to defeat most of the threats is ROPE. Despite the ability of Liu et al. to defeat most of the presented threats, it cannot defeat the Sybil threat.

Although, this paper is considered one of the few papers that described the IPSs in terms of security threats and prevention algorithms, more investigation could be done to evaluate Visible light localization service.