TDOA-enhanced Distance Bounding in the Presence of Noise

被引:0
|
作者
Torres, Nuria Ballher [1 ]
Etzlinger, Bernhard [1 ]
Dehmollaian, Eshagh [1 ]
Springer, Andreas [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Commun Engn & RF Syst, Linz, Austria
来源
16TH IEEE INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS 2020) | 2020年
关键词
distance bounding; passive localization; TDOA; VERIFICATION;
D O I
10.1109/wfcs47810.2020.9114460
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, a new method to secure non-ideal distance bounding techniques using time difference of arrival measurements is presented. Accurate and secure localization is crucial for many applications of real life wireless sensor networks, and extensive research has been dedicated to this topic in recent years. Distance bounding protocols are employed such that a verifier node can authenticate a prover node and at the same time ensure that the prover is close enough to the verifier. In order to increase the robustness of existing distance bounding protocols to attacks such as "early detect" or "late commit", the use of passively listening verifiers that are employed additionally to the distance bounding primary verifier is studied. In such a way an extended set of measurements is obtained. The proposed approach is able to prevent those attacks. We study the presence of some vulnerabilities in our method and we show a way to prevent them.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [21] On the optimal resistance against mafia and distance fraud in distance-bounding protocols
    Gil-Pons, Reynaldo
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2023, 210 : 69 - 78
  • [22] Efficient Public-Key Distance Bounding Protocol
    Kilinc, Handan
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 873 - 901
  • [23] Distance-Bounding Protocols: Are You Close Enough?
    Dimitrakakis, Christos
    Mitrokotsa, Aikaterini
    IEEE SECURITY & PRIVACY, 2015, 13 (04) : 47 - 51
  • [24] Distance Bounding Protocols on TH-UWB Radios
    Benfarah, Ahmed
    Miscopein, Benoit
    Gorce, Jean-Marie
    Lauradoux, Cedric
    Roux, Bernard
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [25] Design of a secure distance-bounding channel for RFID
    Hancke, G. P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (03) : 877 - 887
  • [26] Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
    Poturalski, Marcin
    Flury, Manuel
    Papadimitratos, Panos
    Hubaux, Jean-Pierre
    Le Boudec, Jean-Yves
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1334 - 1344
  • [27] Modeling Enlargement Attacks Against UWB Distance Bounding Protocols
    Compagno, Alberto
    Conti, Mauro
    D'Amico, Antonio Alberto
    Dini, Gianluca
    Perazzo, Pericle
    Taponecco, Lorenzo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (07) : 1565 - 1577
  • [28] A Distance-Bounding Concept for Bilateral IEEE 802.15.4 Communication
    Wittwer, Joachim
    Kirsch, Fabian
    Vossiek, Martin
    IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, COMMUNICATIONS, ANTENNAS AND ELECTRONICS SYSTEMS (COMCAS 2009), 2009,
  • [29] A Note on a Privacy-Preserving Distance-Bounding Protocol
    Aumasson, Jean-Philippe
    Mitrokotsa, Aikaterini
    Pens-Lopez, Pedro
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 78 - 92
  • [30] On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
    Cagalj, Mario
    Saxena, Nitesh
    Uzun, Ersin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 443 - +