A UWB-Based Solution to the Distance Enlargement Fraud Using Hybrid ToF and RSS Measurements

被引:3
作者
Botler, Leo [1 ]
Diwold, Konrad [1 ,2 ]
Romer, Kay [1 ]
机构
[1] Graz Univ Technol, Inst Tech Informat, Graz, Austria
[2] Pro2Future GmbH, Inffeldgasse 25F, A-8010 Graz, Austria
来源
2021 IEEE 18TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2021) | 2021年
关键词
Distance bounding; Distance enlargement; UWB; Signal strength; RSSI;
D O I
10.1109/MASS52906.2021.00049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distance bounding has gained attention in the last decades due to the increasing need for security in applications, such as controlling drones and keyless access control. In such applications, it is important to verify if the two entities participating in a transaction are geographically close to each other. A distance fraud is a known class of attacks in this context, and it has been shown that particular attacks within this class can be successfully applied to any distance estimation approach relying on round-trip time-of-flight (ToF) measurements. In this paper, we show that by combining ToF-based with Received Signal Strength (RSS)based distance estimations, a system comprising at least two anchors can detect distance reduction and enlargement frauds. The latter so far had no general solution. Providing such a solution constitutes the main contribution of this paper. The proposed solution is based on the fact that the apparent position of the prover is constrained to two different feasibility regions: one for RSS and another for ToF-based measurements. These feasibility regions overlap only at the true position of the prover and get inconsistent with an increasing magnitude of the attack. The proposed hybrid method adds virtually no overhead to a ToF-based system, and not only achieves a tighter bound on distance reduction frauds than the pure ToF method, but (tightly) bounds the distance enlargement fraud, which is currently unbounded when using the pure ToF method. Additionally, it requires only two verifiers, outperforming a well-known solution, which requires at least three verifiers. Simulation results show that when using verifiers separated by just 10 cm, suitable for implementation in a single device, the system is able to detect enlargement frauds as small as 120 cm with a high probability.
引用
收藏
页码:324 / 334
页数:11
相关论文
共 16 条
[1]  
Avoine G., 2018, SECURITY DISTANCE BO, V51, DOI [10.1145/3264628, DOI 10.1145/3264628]
[2]  
Botler L, 2019, IEEE WIREL POWER TRA, P434, DOI [10.1109/wptc45513.2019.9055566, 10.1109/WPTC45513.2019.9055566]
[3]  
Brands D., 1993, Work-shop Theory Appl. Cryptographic Techn., P344, DOI [10.1007/3-540-48285-7_30, DOI 10.1007/3-540-48285-7_30]
[4]  
Capkun S, 2005, IEEE INFOCOM SER, P1917
[5]  
Capkun S., 2003, P 1 ACM WORKSH SEC A, P10
[6]   Secure Location Verification Using Simultaneous Multilateration [J].
Chiang, Jerry T. ;
Haas, Jason J. ;
Choi, Jihyuk ;
Hu, Yih-Chun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (02) :584-591
[7]  
Rasmussen Kasper Bonne, 2010, P USENIX SEC S, P389
[8]   Experimental UWB Propagation Channel Path Loss and Time-Dispersion Characterization in a Laboratory Environment [J].
Rubio, Lorenzo ;
Reig, Juan ;
Fernandez, Herman ;
Rodrigo-Penarrocha, Vicent M. .
INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2013, 2013
[9]   A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications [J].
Sinha, Ankur ;
Malo, Pekka ;
Deb, Kalyanmoy .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2018, 22 (02) :276-295
[10]  
Vandooren A., 2018, 2018 IEEE SOI-3D-Subthreshold Microelectronics Technology Unified Conference (S3S), P1, DOI [DOI 10.1109/S3S.2018.8640203, 10.1109/ISGT-Asia.2017.8378439]