Lorenzo Taponecco

Learn More
—In a recent study, solutions have been proposed for completely suppressing the multiple access interference (MAI) arising in the uplink of a quasi-synchronous multicarrier code-division multiple-access network as a consequence of multipath distortions and carrier frequency offsets. This result is achieved by employing exponential orthogonal codes or(More)
—Distance-bounding protocols are able to measure a secure upper bound to the distance between two devices. They are designed to resist to reduction attacks, whose objective is reducing the measured distance. In this paper we focus on the opposite problem, the enlargement attack, which is aimed at enlarging the measured distance. We analyze the feasibility(More)
—The paper is concerned with the impact of clock frequency offsets on the accuracy of ranging systems based on time of arrival (TOA) measurements. It is shown that large TOA errors are incurred if the transmitter and receiver clocks are mistuned by more than just one part per million (ppm). This represents a serious obstacle to the use of commercial(More)
—The performance of Rake receivers for ultrawide-bandwidth communications is discussed, taking into account the effects of multiple access interference (MAI) and channel estimation errors. Two alternative signaling formats are considered: time-hopping pulse-position modulation (TH-PPM) and TH pulse-amplitude modulation (TH-PAM). The channel exhibits(More)
—This paper investigates time of arrival estimation via impulse radio ultra-wideband technology. A dense multipath channel is assumed and frequency-selective propagation effects are taken into account that make the individual received pulses different in shape from the transmitted monocycles. Assuming only an approximate knowledge of the received pulses'(More)
Distance bounding protocols make it possible to determine a trusted upper bound on the distance between two devices. Their key property is to resist reduction attacks, i.e., attacks aimed at reducing the distance measured by the protocol. Recently, researchers have also focused on enlargement attacks, aimed at enlarging the measured distance. Providing(More)