[PDF][PDF] UWB-based secure ranging and localization

NO Tippenhauer, S Capkun - Technical Report/ETH …, 2012 - research-collection.ethz.ch
In this paper, we propose and implement a novel ID-based secure ranging protocol. Our
protocol is inspired by existing authenticated ranging and distance–bounding protocols, and …

Id-based secure distance bounding and localization

NO Tippenhauer, S Čapkun - … : 14th European Symposium on Research in …, 2009 - Springer
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike
traditional secure distance measurement protocols, our protocol is based on standard …

UWB based secure ranging and localization

B Pestourie - 2020 - theses.hal.science
Location services are foreseen as one of the major IoT features in the next years, and have
gained a lot of interest over the last decade from the literature of Wireless Sensors …

An UWB ranging-based localization strategy with internal attack immunity

Y Wang, X Ma, G Leus - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15. 4a standard for
wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An …

Secure localization and authentication in ultra-wideband sensor networks

Y Zhang, W Liu, Y Fang, D Wu - IEEE Journal on Selected …, 2006 - ieeexplore.ieee.org
The recent Federal Communications Commission regulations for ultra-wideband (UWB)
transmission systems have sparked a surge of research interests in the UWB technology …

Experimental evaluation of IEEE 802.15. 4z UWB ranging performance under interference

J Tiemann, J Friedrich, C Wietfeld - Sensors, 2022 - mdpi.com
The rise of precise wireless localization for industrial and consumer use is continuing to
challenge a significant amount of research. Recently the new ultra-wideband standard IEEE …

Security evaluation with an indoor UWB localization open platform: Acknowledgment attack case study

B Pestourie, V Beroulle, N Fourty - 2019 IEEE 30th Annual …, 2019 - ieeexplore.ieee.org
Indoor localization is a growing field of the Internet of Things (IoT) which is used in various
sensitive applications such as manufacturing chain optimization or location-based …

Modeling enlargement attacks against UWB distance bounding protocols

A Compagno, M Conti, AA D'Amico… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Distance bounding protocols make it possible to determine a trusted upper bound on the
distance between two devices. Their key property is to resist reduction attacks, ie, attacks …

You're where? prove it! towards trusted indoor location estimation of mobile devices

JT Biehl, AJ Lee, G Filby, M Cooper - Proceedings of the 2015 ACM …, 2015 - dl.acm.org
Location-enabled applications now permeate the mobile computing landscape. As
technologies like Bluetooth Low Energy (BLE) and Apple's iBeacon protocols begin to see …

Effectiveness of distance-decreasing attacks against impulse radio ranging

M Flury, M Poturalski, P Papadimitratos… - Proceedings of the third …, 2010 - dl.acm.org
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-
wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer …