Next Article in Journal
Fabrication and Optimization of Bilayered Nanoporous Anodic Alumina Structures as Multi-Point Interferometric Sensing Platform
Next Article in Special Issue
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations
Previous Article in Journal
Implementation of a Surface Electromyography-Based Upper Extremity Exoskeleton Controller Using Learning from Demonstration
Previous Article in Special Issue
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks
Article Menu

Export Article

Open AccessArticle
Sensors 2018, 18(2), 469; doi:10.3390/s18020469

Secure Indoor Localization Based on Extracting Trusted Fingerprint

School of Information Science and Engineering, Hunan University, Changsha 410012, China
*
Author to whom correspondence should be addressed.
Received: 3 January 2018 / Revised: 25 January 2018 / Accepted: 29 January 2018 / Published: 5 February 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
View Full-Text   |   Download PDF [3680 KB, uploaded 6 February 2018]   |  

Abstract

Indoor localization based on WiFi has attracted a lot of research effort because of the widespread application of WiFi. Fingerprinting techniques have received much attention due to their simplicity and compatibility with existing hardware. However, existing fingerprinting localization algorithms may not resist abnormal received signal strength indication (RSSI), such as unexpected environmental changes, impaired access points (APs) or the introduction of new APs. Traditional fingerprinting algorithms do not consider the problem of new APs and impaired APs in the environment when using RSSI. In this paper, we propose a secure fingerprinting localization (SFL) method that is robust to variable environments, impaired APs and the introduction of new APs. In the offline phase, a voting mechanism and a fingerprint database update method are proposed. We use the mutual cooperation between reference anchor nodes to update the fingerprint database, which can reduce the interference caused by the user measurement data. We analyze the standard deviation of RSSI, mobilize the reference points in the database to vote on APs and then calculate the trust factors of APs based on the voting results. In the online phase, we first make a judgment about the new APs and the broken APs, then extract the secure fingerprints according to the trusted factors of APs and obtain the localization results by using the trusted fingerprints. In the experiment section, we demonstrate the proposed method and find that the proposed strategy can resist abnormal RSSI and can improve the localization accuracy effectively compared with the existing fingerprinting localization algorithms. View Full-Text
Keywords: fingerprint; indoor localization; secure; trusted factor; WiFi fingerprint; indoor localization; secure; trusted factor; WiFi
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Luo, J.; Yin, X.; Zheng, Y.; Wang, C. Secure Indoor Localization Based on Extracting Trusted Fingerprint. Sensors 2018, 18, 469.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top