2022
DOI: 10.1155/2022/2323293
|View full text |Cite
|
Sign up to set email alerts
|

CNN-Based Attack Defense for Device-Free Localization

Abstract: Device-free localization technology aims to find a target by analyzing the signal strength difference between transmitter and receiver deployed in the target area in advance. Up to now, device-free localization technology has been applied to a wide range of applications and scenarios, such as intrusion detection, environment modeling, and activity recognition. However, some sensors remain at potential risk that signal strength values of sensors have been tampered, or even devices sensors are physically damaged… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…In this section, we simulate the experiment on the real‐world KITTI dataset [7] under the LiDAR spoofing attack (LSA) and GPS spoofing attack (GSA). Our method was trained on 650 samples and achieved an average accuracy of 100%, which is 56% higher than deep learning methods [4] with the same amount of data. Based on the analysis of real‐world sensor attack models [2], we set the anomaly rate to 0.025%.GSA is design based on experiments [8].…”
Section: Simulation and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we simulate the experiment on the real‐world KITTI dataset [7] under the LiDAR spoofing attack (LSA) and GPS spoofing attack (GSA). Our method was trained on 650 samples and achieved an average accuracy of 100%, which is 56% higher than deep learning methods [4] with the same amount of data. Based on the analysis of real‐world sensor attack models [2], we set the anomaly rate to 0.025%.GSA is design based on experiments [8].…”
Section: Simulation and Discussionmentioning
confidence: 99%
“…Sensor redundancy enhances environmental perception through the integration of multiple sensors [1]. Deep learning approaches train on large data sets to perform advanced attack recognition tasks [4]. However, sensor redundancy methods require high sensor accuracy and consistency, which may be affected by sensor noise and attacks in real scenarios and increase the cost [3].…”
Section: Introductionmentioning
confidence: 99%
“…Wei et al [17] implemented a phase calibration method to mitigate phase shifts caused by imperfect synchronization and used a structural similarity-based enhancement method to extend datasets and obtain additional fingerprint feature information, enhancing localization accuracy. Han et al [18] developed a defense method using Convolutional Neural Networks (CNN) to counter device-free localization attacks. They transformed the localization problem into an image classification problem and employed CNN for anomaly detection, enhancing system robustness and security.…”
Section: A Csi-based Device-free Passive Fingerprinting Localizationmentioning
confidence: 99%
“…Localization Techniques. Numerous wireless sensor network (WSN) applications rely on localization to locate a target by comparing the signal strengths of transmitters and receivers already set up in the region of interest [33,34]. Some algorithms are essential for finding and assessing the location and position of the nodes and security enhance-ment for precise location of the target.…”
Section: Cluster Formation and Data Aggregationmentioning
confidence: 99%