EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Detecting relay attacks with timing-based protocols
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
SecNav: secure broadcast localization and time synchronization in wireless networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Keep your enemies close: distance bounding against smartcard relay attacks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Location privacy of distance bounding protocols
Proceedings of the 15th ACM conference on Computer and communications security
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
Distance bounding in noisy environments
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
An asymmetric security mechanism for navigation signals
IH'04 Proceedings of the 6th international conference on Information Hiding
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Secure positioning in wireless networks
IEEE Journal on Selected Areas in Communications
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Group distance bounding protocols
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Physical-layer attacks on chirp-based ranging systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Eliminating rouge femtocells based on distance bounding protocol and geographic information
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure distance measurement as elemental building block, and enables the implementation of secure distance bounding using commercial off-the-shelf (COTS) ranging devices. We use the proposed protocol to implement secure radio frequency (RF) Time-of-Arrival (ToA) distance measurements on an ultra-wideband (UWB) ranging platform. Based on this, we implement Verifiable Multilateration -- a secure localization scheme that enables the computation of a correct device location in the presence of an adversary. To the best of our knowledge, this is the first implementation of an RF ToA secure localization system.