Delcourt, MargueriteLe Boudec, Jean-Yves2021-09-112021-09-112021-09-112021-01-0110.1109/TIFS.2020.3001741https://infoscience.epfl.ch/handle/20.500.14299/181209WOS:000692207600009In this paper, we focus on the localization of a passive source from time difference of arrival (TDOA) measurements. TDOA values are computed with respect to pairs of fixed sensors that are required to be accurately time-synchronized. This constitutes a weakness as all synchronization techniques are vulnerable to delay injections. Attackers are able either to spoof the signal or to inject asymmetric delays in the communication channel. By nature, TDOA measurements are highly sensitive to time-synchronization offsets between sensors. We first illustrate that time-synchronization attacks can severely affect the localization process. With a delay of a few microseconds injected on one sensor, the resulting estimate might be several kilometers away from the true location of the unknown source. We show that residual analysis does not enable the detection and identification of time-synchronization attacks. Our main contribution is then to propose a two-step TDOA-localization technique that is robust against time-synchronization attacks. It uses a known source to define a weight for each pair of sensors, reflecting the confidence in their time synchronization. Our solution then uses the weighted least-squares estimator with the newly created weights and the TDOA measurements received from the unknown source. As a result, our method either identifies the network as being too corrupt to localize, or gives a corrected estimate of the unknown position along with a confidence metric. Numerical results illustrate the performance of our technique.Computer Science, Theory & MethodsEngineering, Electrical & ElectronicComputer ScienceEngineeringsensorsdelayssynchronizationcalibrationfrequency estimationoscillatorscommunication system securityelectronic warfaresource localizationtdoatime-synchronization attackwireless sensor networksdelayestimatorerrorTDOA Source-Localization Technique Robust to Time-Synchronization Attackstext::journal::journal article::research article