Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Overcoming security vulnerabilities in deep learning-based indoor localization frameworks on mobile devices
Tiku S., Pasricha S. ACM Transactions on Embedded Computing Systems18 (6):1-24,2019.Type:Article
Date Reviewed: Apr 22 2020

This paper analyzes “the vulnerability of a convolutional neural network (CNN)–based indoor localization solution.” The authors “propose a novel methodology to maintain indoor localization accuracy ... in the presence of access point (AP) attacks.”

Indoor localization is an emerging area and the paper is significant in this context. AP attacks can have variable impact on indoor localization accuracy. In extreme cases, such as emergency response, low accuracy in indoor localization can be fatal. The paper elaborates on the threat model and also describes background work.

The experiment section of the paper is well written. The proposed technique, SCNNLOC, is compared with an existing CNN-based indoor localization framework (CNNLOC). On average, SCNNLOC is ten times more secure than CNNLOC. The authors consider various attacks “such as [wireless access point, WAP] spoofing, WAP jamming, and even environmental changes.” An important area that still needs to be explored is time (or processing delay) in estimating the location. For critical applications such as emergency response systems, latency could be critical.

Reviewer:  Jawwad Shamsi Review #: CR146953 (2007-0168)
Bookmark and Share
 
Security and Protection (D.4.6 )
 
 
Neural Nets (C.1.3 ... )
 
 
Learning (I.2.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy