메뉴 건너뛰기




Volumn , Issue , 2010, Pages 117-128

Effectiveness of distance-decreasing attacks against impulse radio ranging

Author keywords

Distance bounding; Ieee 802.15.4a; Impulse radio; Physical layer attack; Ranging; Relay attack; Secure ranging; Ultra wideband

Indexed keywords

DISTANCE BOUNDING; IEEE 802.15.4A; IMPULSE RADIO; PHYSICAL LAYERS; RANGING; RELAY ATTACK;

EID: 77952350344     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1741866.1741887     Document Type: Conference Paper
Times cited : (37)

References (35)
  • 1
    • 0012578409 scopus 로고
    • Distance-bounding protocols
    • S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYPT, 1993.
    • (1993) EUROCRYPT
    • Brands, S.1    Chaum, D.2
  • 2
    • 4544259841 scopus 로고    scopus 로고
    • SECTOR: Secure tracking of node encounters in multi-hop wireless networks
    • S. Čapkun, L. Buttýan, and J.-P. Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In SASN, 2003.
    • (2003) SASN
    • Čapkun, S.1    Buttýan, L.2    Hubaux, J.-P.3
  • 4
    • 33847329743 scopus 로고    scopus 로고
    • An RFID distance bounding protocol
    • G. Hancke and M. Kuhn. An RFID distance bounding protocol. In SecureComm, 2005.
    • (2005) SecureComm
    • Hancke, G.1    Kuhn, M.2
  • 8
    • 77952347546 scopus 로고    scopus 로고
    • Distance bounding in noisy environments
    • D. Singeĺee and B. Preneel. Distance bounding in noisy environments. In ESAS, 2007.
    • (2007) ESAS
    • Singeĺee, D.1    Preneel, B.2
  • 10
    • 70349272427 scopus 로고    scopus 로고
    • Location privacy of distance bounding protocols
    • K. B. Rasmussen and S. Čapkun. Location privacy of distance bounding protocols. In CCS, 2008.
    • (2008) CCS
    • Rasmussen, K.B.1    Čapkun, S.2
  • 11
    • 55349135872 scopus 로고    scopus 로고
    • Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels
    • Jorge Munilla and Alberto Peinado. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wireless Communications and Mobile Computing, 8(9), 2008.
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.9
    • Munilla, J.1    Peinado, A.2
  • 12
    • 70349940333 scopus 로고    scopus 로고
    • The swiss-knife RFID distance bounding protocol
    • P.J. Lee and J.H. Cheon, editors
    • C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The swiss-knife RFID distance bounding protocol. In P.J. Lee and J.H. Cheon, editors, ICISC, 2008.
    • (2008) ICISC
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 13
    • 76749095501 scopus 로고    scopus 로고
    • RFID distance bounding protocol with mixed challenges to prevent relay attacks
    • C. H. Kim and G. Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks. In CANS, 2009.
    • (2009) CANS
    • Kim, C.H.1    Avoine, G.2
  • 15
    • 33847269759 scopus 로고    scopus 로고
    • Picking virtual pockets using relay attacks on contactless smartcard
    • Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contactless smartcard. In SecureComm, 2005.
    • (2005) SecureComm
    • Kfir, Z.1    Wool, A.2
  • 17
    • 37749043207 scopus 로고    scopus 로고
    • SecNav: Secure broadcast localization and time synchronization in wireless networks
    • K. B. Rasmussen, S. Čapkun, and M. Cagalj. SecNav: s ecure broadcast localization and time synchronization in wireless networks. In MobiCom. ACM, 2007.
    • (2007) MobiCom. ACM
    • Rasmussen, K.B.1    Čapkun, S.2    Cagalj, M.3
  • 18
    • 84876367662 scopus 로고    scopus 로고
    • So near and yet so far: Distance-bounding attacks in wireless networks
    • J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In ESAS, 2006.
    • (2006) ESAS
    • Clulow, J.1    Hancke, G.P.2    Kuhn, M.G.3    Moore, T.4
  • 19
    • 56749181480 scopus 로고    scopus 로고
    • Attacks on time-of-flight distance bounding channels
    • G. P. Hancke and M. G. Kuhn. Attacks on time-of-flight distance bounding channels. In WiSec, 2008.
    • (2008) WiSec
    • Hancke, G.P.1    Kuhn, M.G.2
  • 21
    • 77952376976 scopus 로고    scopus 로고
    • IEEE Std 802.15.4-2006 (Rev. of IEEE Std 802.15.4-2003), 2006
    • IEEE Std 802.15.4-2006 (Rev. of IEEE Std 802.15.4-2003), 2006.
  • 22
    • 77952324420 scopus 로고    scopus 로고
    • IEEE Std 802.15.4a-2007 (Amd. to IEEE Std 802.15.4-2006)
    • IEEE Std 802.15.4a-2007 (Amd. to IEEE Std 802.15.4-2006).
  • 23
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu. Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun., 24(4), 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.4
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 25
    • 56749134314 scopus 로고    scopus 로고
    • An energy detection receiver robust to multi-user interference fo r IEEE 802.15.4a networks
    • M. Flury, R. Merz, and J.-Y. Le Boudec. An energy detection receiver robust to multi-user interference fo r IEEE 802.15.4a networks. In ICUWB, 2008.
    • ICUWB 2008
    • Flury, M.1    Merz, R.2    Le Boudec, J.-Y.3
  • 28
    • 77952338051 scopus 로고    scopus 로고
    • IEEE 802.15.4a channel model - final report 2004
    • IEEE 802.15.4a channel model - final report, 2004.
  • 29
    • 14244260660 scopus 로고    scopus 로고
    • Robust noncoherent receiver exploiting UWB channel properties
    • M. Weisenhorn and W. Hirt. Robust noncoherent receiver exploiting UWB channel properties. In Join t UWBST & IWUWBS, 2004.
    • (2004) Join T UWBST & IWUWBS
    • Weisenhorn, M.1    Hirt, W.2
  • 30
    • 0141470711 scopus 로고    scopus 로고
    • The effects of timing jitter on the performance of impulse radio
    • W.M. Lovelace and J.K. Townsend. The effects of timing jitter on the performance of impulse radio. In UWBST, 2002.
    • (2002) UWBST
    • Lovelace, W.M.1    Townsend, J.K.2
  • 31
    • 77952839301 scopus 로고    scopus 로고
    • Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks
    • M. Flury, R. Merz, and J.-Y. Le Boudec. Robust non-coherent timing acquisition in IEEE 802.15.4a IR-UWB networks. In PIMRC, 2009.
    • (2009) PIMRC
    • Flury, M.1    Merz, R.2    Le Boudec, J.-Y.3
  • 32
    • 14244260662 scopus 로고    scopus 로고
    • An impul se radio asynchronous transceiver for high data rates
    • S. Paquelet, L.-M. Aubert, and B. Uguen. An impul se radio asynchronous transceiver for high data rates. IWUWB, 2004.
    • (2004) IWUWB
    • Paquelet, S.1    Aubert, L.-M.2    Uguen, B.3
  • 33
    • 0029391728 scopus 로고
    • Modulation techniques for high-speed wireless indoor systems using narrowbeam antennas
    • P. F. Driessen and L. J. Greenstein. Modulation techniques for high-speed wireless indoor systems using narrowbeam antennas. IEEE Trans. Commun. , 1995.
    • (1995) IEEE Trans. Commun.
    • Driessen, P.F.1    Greenstein, L.J.2
  • 34
    • 34547315697 scopus 로고    scopus 로고
    • MLSE post-detection f or ISI mitigation and synchronization in UWB low complexity receivers
    • F. Trösch and A. Wittneben. MLSE post-detection f or ISI mitigation and synchronization in UWB low complexity receivers. In VTC, 2007.
    • (2007) VTC
    • Trösch, F.1    Wittneben, A.2
  • 35
    • 77952332017 scopus 로고    scopus 로고
    • http://www.realtechnews.com/posts/1366.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.