TDOA-enhanced Distance Bounding in the Presence of Noise

被引:0
|
作者
Torres, Nuria Ballher [1 ]
Etzlinger, Bernhard [1 ]
Dehmollaian, Eshagh [1 ]
Springer, Andreas [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Commun Engn & RF Syst, Linz, Austria
来源
16TH IEEE INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS 2020) | 2020年
关键词
distance bounding; passive localization; TDOA; VERIFICATION;
D O I
10.1109/wfcs47810.2020.9114460
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, a new method to secure non-ideal distance bounding techniques using time difference of arrival measurements is presented. Accurate and secure localization is crucial for many applications of real life wireless sensor networks, and extensive research has been dedicated to this topic in recent years. Distance bounding protocols are employed such that a verifier node can authenticate a prover node and at the same time ensure that the prover is close enough to the verifier. In order to increase the robustness of existing distance bounding protocols to attacks such as "early detect" or "late commit", the use of passively listening verifiers that are employed additionally to the distance bounding primary verifier is studied. In such a way an extended set of measurements is obtained. The proposed approach is able to prevent those attacks. We study the presence of some vulnerabilities in our method and we show a way to prevent them.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [31] The distance-bounding protocol based on Russian cryptographic algorithms
    Belsky, Vladimir
    Chichaeva, Anastasiia
    Shishkin, Vasily
    Tsaregorodtsev, Kirill
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 485 - 495
  • [32] Distance-Bounding Protocols: Verification without Time and Location
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 549 - 566
  • [33] The distance-bounding protocol based on Russian cryptographic algorithmsThe distance-bounding protocol based on Russian cryptographic algorithmsV. Belsky et al.
    Vladimir Belsky
    Anastasiia Chichaeva
    Vasily Shishkin
    Kirill Tsaregorodtsev
    Journal of Computer Virology and Hacking Techniques, 2024, 20 (3) : 485 - 495
  • [34] Enhanced Combined Weighted Method for TDOA-Based Localization
    Simon, Gyula
    2024 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, I2MTC 2024, 2024,
  • [35] Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
    Gerault, David
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 351 - 359
  • [36] Comparing distance bounding protocols: A critical mission supported by decision theory
    Avoine, Gildas
    Mauw, Sjouke
    Trujillo-Rasua, Rolando
    COMPUTER COMMUNICATIONS, 2015, 67 : 92 - 102
  • [37] On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding
    Taponecco, Lorenzo
    Perazzo, Pericle
    D'Amico, Antonio A.
    Dini, Gianluca
    IEEE COMMUNICATIONS LETTERS, 2014, 18 (02) : 257 - 260
  • [38] HB+DB: Distance bounding meets human based authentication
    Pagnin, Elena
    Yang, Anjia
    Hu, Qiao
    Hancke, Gerhard
    Mitrokotsa, Aikaterini
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 627 - 639
  • [39] Energy-Efficient Distance-Bounding with Residual Charge Computation
    Zhuang, Yunhui
    Yang, Anjia
    Hancke, Gerhard P.
    Wong, Duncan S.
    Yang, Guomin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 365 - 376
  • [40] Noise-Resistant Estimation Algorithm for TDOA and FDOA in Passive Emitter Localization
    Liu, Zhixin
    Hu, Dexiu
    Zhao, Yongjun
    Zhao, Yongsheng
    Wang, Rui
    Jiang, Hongzhi
    2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 539 - 543