TDOA-enhanced Distance Bounding in the Presence of Noise

被引:0
|
作者
Torres, Nuria Ballher [1 ]
Etzlinger, Bernhard [1 ]
Dehmollaian, Eshagh [1 ]
Springer, Andreas [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Commun Engn & RF Syst, Linz, Austria
来源
16TH IEEE INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS 2020) | 2020年
关键词
distance bounding; passive localization; TDOA; VERIFICATION;
D O I
10.1109/wfcs47810.2020.9114460
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, a new method to secure non-ideal distance bounding techniques using time difference of arrival measurements is presented. Accurate and secure localization is crucial for many applications of real life wireless sensor networks, and extensive research has been dedicated to this topic in recent years. Distance bounding protocols are employed such that a verifier node can authenticate a prover node and at the same time ensure that the prover is close enough to the verifier. In order to increase the robustness of existing distance bounding protocols to attacks such as "early detect" or "late commit", the use of passively listening verifiers that are employed additionally to the distance bounding primary verifier is studied. In such a way an extended set of measurements is obtained. The proposed approach is able to prevent those attacks. We study the presence of some vulnerabilities in our method and we show a way to prevent them.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [1] Defining Secure Areas for TDOA-Enhanced Non-Ideal Distance Bounding
    Torres, Nuria Ballber
    Etzlinger, Bernhard
    Dehmollaian, Eshagh
    Springer, Andreas
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 348 - 353
  • [2] Challenges in Distance Bounding
    Boureanu, Ioana
    Vaudenay, Serge
    IEEE SECURITY & PRIVACY, 2015, 13 (01) : 41 - 48
  • [3] Quantum Distance Bounding
    Abidin, Aysajan
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 233 - 238
  • [4] Distance Hijacking Attacks on Distance Bounding Protocols
    Cremers, Cas
    Rasmussen, Kasper B.
    Schmidt, Benedikt
    Capkun, Srdjan
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 113 - 127
  • [5] Distance-bounding Identification
    Ahmadi, Ahmad
    Safavi-Naini, Reihaneh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 202 - 212
  • [6] Distance bounding in noisy environments
    Singelee, Dave
    Preneel, Bart
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2007, 4572 : 101 - +
  • [7] Distance Bounding Facing Both Mafia and Distance Frauds
    Trujillo-Rasua, Rolando
    Martin, Benjamin
    Avoine, Gildas
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (10) : 5690 - 5698
  • [8] Location Privacy of Distance Bounding Protocols
    Rasmussen, Kasper Bonne
    Capkun, Srdjan
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159
  • [9] Survey of Distance Bounding Protocols and Threats
    Brelurut, Agnes
    Gerault, David
    Lafourcade, Pascal
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 29 - 49
  • [10] RFID Distance Bounding Multistate Enhancement
    Avoine, Gildas
    Floerkemeier, Christian
    Martin, Benjamin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 290 - +