An UWB ranging-based localization strategy with internal attack immunity

@article{Wang2010AnUR,
  title={An UWB ranging-based localization strategy with internal attack immunity},
  author={Yiyin Wang and Xiaoli Ma and Geert Leus},
  journal={2010 IEEE International Conference on Ultra-Wideband},
  year={2010},
  volume={2},
  pages={1-4}
}
The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15.4a standard for wireless networks. However, it is vulnerable to malicious attacks (e.g., internal attacks). An internal ranging attack here refers to a fraudulent timestamp report. For example, a compromised sensor node tampers its timestamp report to spoof its processing time in order to malignly decrease or enlarge distance measurements, or a sensor node submits an inaccurate timestamp report due to the clock drift. In… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs)

  • IEEE Working Group 802.15.4
  • Tech. Rep., 2007.
  • 2007
2 Excerpts

Similar Papers

Loading similar papers…