An information theoretic location verification system for wireless networks

Shihao Yan, Robert Malaney, Ido Nevat, Gareth W. Peters

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

16 Citations (Scopus)


As location-based applications become ubiquitous in emerging wireless networks, a reliable Location Verification System (LVS) will be of growing importance. In this paper we propose, for the first time, a rigorous information-theoretic framework for an LVS. The theoretical framework we develop illustrates how the threshold used in the detection of a spoofed location can be optimized in terms of the mutual information between the input and output data of the LVS. In order to verify the legitimacy of our analytical framework we have carried out detailed numerical simulations. Our simulations mimic the practical scenario where a system deployed using our framework must make a binary Yes/No “malicious decision” to each snapshot of the signal strength values obtained by base stations. The comparison between simulation and analysis shows excellent agreement. Our optimized LVS framework provides a defence against location spoofing attacks in emerging wireless networks such as those envisioned for Intelligent Transport Systems, where verification of location information is of paramount importance.
Original languageEnglish
Title of host publication2012 IEEE Global Communications Conference (GLOBECOM)
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Electronic)9781467309219, 9781467309196
ISBN (Print)9781467309202
Publication statusPublished - 2012
Externally publishedYes
Event2012 IEEE Global Communications Conference, GLOBECOM 2012 - Anaheim, CA, United States
Duration: 3 Dec 20127 Dec 2012

Publication series

ISSN (Print)1930-529X
ISSN (Electronic)1930-529X


Conference2012 IEEE Global Communications Conference, GLOBECOM 2012
Country/TerritoryUnited States
CityAnaheim, CA


Dive into the research topics of 'An information theoretic location verification system for wireless networks'. Together they form a unique fingerprint.

Cite this