Corpus ID: 12808674

Range Authentication Protocols for Localization

@inproceedings{Meadows2007RangeAP,
  title={Range Authentication Protocols for Localization},
  author={Catherine A. Meadows and Paul F. Syverson},
  year={2007}
}
A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distance bounding protocols were originally proposed for the verification of proximity. More recently, they… Expand

Figures from this paper

References

SHOWING 1-10 OF 16 REFERENCES
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
TLDR
It is shown that proposed distance-bounding protocols of Hu, Perrig and Johnson, Sastry, Shankar and Wagner, and Capkun and Hubaux are vulnerable to a guessing attack where the malicious prover preemptively transmits guessed values for a number of response bits. Expand
An RFID Distance Bounding Protocol
  • G. Hancke, M. Kuhn
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
TLDR
A new distance-bounding protocol based on ultra-wideband pulse communication is proposed, aimed at being implementable using only simple, asynchronous, low-power hardware in the token, particularly well suited for use in passive low-cost tokens, noisy environments and high-speed applications. Expand
Secure Verification of Location Claims with Simultaneous Distance Modification
TLDR
It is demonstrated that the SDM property guarantees secure verification of location claims with a small number of verifiers even if some of them maliciously collude with the device. Expand
Secure verification of location claims
TLDR
The Echo protocol is extremely lightweight: it does not require time synchronization, cryptography, or very precise clocks, and it is believed that it is well suited for use in small, cheap, mobile devices. Expand
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
TLDR
This work proposes integrity codes (I-codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material, and introduces a novel concept called "authentication through presence", whose broad applications include broadcast authentication, key establishment and navigation signal protection. Expand
ROPE: robust position estimation in wireless sensor networks
TLDR
It is shown that ROPE bounds the ability of an attacker to spoof sensors' locations, with relatively low density deployment of reference points, and is confirmed the robustness of ROPE against attacks analytically and via simulations. Expand
Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
TLDR
This paper presents a method for establishing and securing spontaneous interactions on the basis of spatial references that capture the spatial relationship of the involved devices. Expand
Time synchronization attacks in sensor networks
TLDR
A survey of the most common time synchronization protocols and outline the possible attacks on each protocol is given and how different sensor network applications that are affected by time synchronization attacks are discussed, and some countermeasures for these attack are proposed. Expand
Secure positioning in wireless networks
TLDR
This paper proposes a mechanism for secure positioning of wireless devices, that is verifiable multilateration, and shows how this mechanism can be used to secure positioning in sensor networks. Expand
Secure Localization with Hidden and Mobile Base Stations
TLDR
NCCR-MICS/CL3 Reference LCA-CONF-2005-029 Record created on 2005-12-07, modified on 2017-05-12. Expand
...
1
2
...