A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
In the past, home automation was a small market for technology enthusiasts.
Interconnectivity between devices was down to the owner's technical skills and creativity …

Physical-layer attacks on chirp-based ranging systems

A Ranganathan, B Danev, A Francillon… - Proceedings of the fifth …, 2012 - dl.acm.org
Chirp signals have been extensively used in radar and sonar systems to determine distance,
velocity and angular position of objects and in wireless communications as a spread …

[PDF][PDF] Securing distance measurement against physical layer attacks

M Singh - 2021 - research-collection.ethz.ch
Secure and accurate distance measurement between devices is an essential requirement of
many applications, some notable applications being contactless access, tracking, and …

Positioning technologies in location-based services

E Martin, L Liu, M Covington, P Pesti… - Location-Based …, 2018 - taylorfrancis.com
Mobile devices today boast processing power and memory on par with that found in desktop
computers. Wireless connectivity has become much more readily available. Many …

[PDF][PDF] Physical-layer techniques for secure proximity verification and localization

A Ranganathan - 2016 - research-collection.ethz.ch
Today, location and proximity information are key to a number of emerging applications.
With the advent of the Internet of Things and autonomous cyber-physical systems, the …

[PDF][PDF] Secure Ranging: Physical-Layer Attacks and Countermeasures

P Leu - 2023 - research-collection.ethz.ch
Over the past years, applications that use relative distance estimates between devices have
seen widespread adoption. How devices can establish a notion of distance or relative …

A low-cost secure neighbor verification protocol for wireless sensor networks

R Shokri, M Poturalski, G Ravot, P Papadimitratos… - 2008 - infoscience.epfl.ch
Neighbor Discovery (ND) is an enabler for communication in Wireless Sensor Networks
(WSN). Attacks against ND, notably the well-known and simple to mount wormhole attack …

[PDF][PDF] Security Analysis of the Rasmussen-ˇCapkun CRCS Distance Bounding Protocol

D Singelée, B Preneel - 2010 - researchgate.net
Rasmussen and Capkun recently presented the first practical realization of an RF-based
distance bounding protocol. By using the technique of Challenge Reflection with Channel …

W-SPS: Designing a Wide-Area Secure Positioning System

DY Yu, A Ranganathan, RJ Masti, C Soriente… - Cryptology ePrint …, 2015 - eprint.iacr.org
Motivated by the security and functional limitations of satellite positioning systems, we
explore a design of a Wide-Area Secure Positioning System. The main goals of this system …