TDOA-enhanced Distance Bounding in the Presence of Noise

被引:0
|
作者
Torres, Nuria Ballher [1 ]
Etzlinger, Bernhard [1 ]
Dehmollaian, Eshagh [1 ]
Springer, Andreas [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Commun Engn & RF Syst, Linz, Austria
来源
16TH IEEE INTERNATIONAL CONFERENCE ON FACTORY COMMUNICATION SYSTEMS (WFCS 2020) | 2020年
关键词
distance bounding; passive localization; TDOA; VERIFICATION;
D O I
10.1109/wfcs47810.2020.9114460
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, a new method to secure non-ideal distance bounding techniques using time difference of arrival measurements is presented. Accurate and secure localization is crucial for many applications of real life wireless sensor networks, and extensive research has been dedicated to this topic in recent years. Distance bounding protocols are employed such that a verifier node can authenticate a prover node and at the same time ensure that the prover is close enough to the verifier. In order to increase the robustness of existing distance bounding protocols to attacks such as "early detect" or "late commit", the use of passively listening verifiers that are employed additionally to the distance bounding primary verifier is studied. In such a way an extended set of measurements is obtained. The proposed approach is able to prevent those attacks. We study the presence of some vulnerabilities in our method and we show a way to prevent them.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [41] TDOA Source Localization in the Presence of Synchronization Clock Bias and Sensor Position Errors
    Wang, Yue
    Ho, K. C.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (18) : 4532 - 4544
  • [42] Building ToF Resiliency Into UWB-Based Secure Distance Bounding Protocols
    Nkrowl, Raphael E.
    Boshoffl, Dutliff
    Silval, Bruno J.
    Liu, Zhe
    Hanekel, Gerhard P.
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [43] Distance-bounding based defense against relay attacks in wireless networks
    Tang, Caimu
    Wu, Dapeng Oliver
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4071 - 4078
  • [44] Distance Bounding: A Practical Security Solution for Real-Time Location Systems
    Abu-Mahfouz, Adnan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 16 - 27
  • [45] Distance-bounding proof of knowledge to avoid real-time attacks
    Bussard, L
    Bagga, W
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
  • [46] Noise-Robust Least-Squares Method in TDOA Estimation of a Source Location
    Al-Asadi, Ahmed Waleed
    Ali, Nabeel Salih
    2021 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT 2021), 2021, : 123 - 128
  • [47] TDOA Estimation Algorithm Based on Generalized Cyclic Correntropy in Impulsive Noise and Cochannel Interference
    Chen, Xing
    Qiu, Tianshuang
    Liu, Cheng
    Ma, Jitong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (10): : 1625 - 1630
  • [48] Grouping-Proof-Distance-Bounding Protocols: Keep All Your Friends Close
    Karlsson, Christoffer
    Mitrokotsa, Aikaterini
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (07) : 1365 - 1368
  • [49] An Improved KNN Algorithm Based on Adaptive Cluster Distance Bounding for High Dimensional Indexing
    Hong, Huang
    Juan, Guo
    Ben, Wang
    2012 THIRD GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS 2012), 2012, : 213 - 217
  • [50] Two-Hop Distance-Bounding Protocols: Keep Your Friends Close
    Yang, Anjia
    Pagnin, Elena
    Mitrokotsa, Aikaterini
    Hancke, Gerhard P.
    Wong, Duncan S.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (07) : 1723 - 1736