wireless networks. However, it is vulnerable to malicious attacks (eg, internal attacks). An
internal ranging attack here refers to a fraudulent timestamp report. For example, a
compromised sensor node tampers its timestamp report to spoof its processing time in order
to malignly decrease or enlarge distance measurements, or a sensor node submits an
inaccurate timestamp report due to the clock drift. In this paper, we propose an UWB ranging …