Chirp signals have been extensively used in radar and sonar systems to determine distance, velocity and angular position of objects and in wireless communications as a spread spec-trum technique to provide robustness and high processing gain. Recently, several standards have adopted chirp spread spectrum (CSS) as an underlying physical-layer scheme for precise, low-power and low-complexity real-time localiza-tion. While CSS-based ranging and localization solutions have been implemented and deployed, their security has so far not been analyzed. In this work, we analyze CSS-based ranging and localiza-tion systems. We focus on distance decreasing relay attacks that have proven detrimental for the security of proximity-based access control syst...
To provide high ranging precision in multipath environments, a ranging protocol should find the firs...
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks ...
Distance bounding protocols are secure protocols to determine an upper bound to the distance between...
Recently, researchers have proposed a number of ranging and positioning techniques for wireless netw...
Multicarrier phase-based ranging is fast emerging as a cost-optimized solution for a wide variety of...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
Abstract—The problem of measuring the distance between two electronic devices in the presence of an ...
International audience802.11 Fine Timing Measurement is an indoor ranging technique. Because it is u...
This paper develops an anti-collision algorithm for localization of multiple chirp-spread-spectrum (...
In this paper, we propose an algorithm for acquiring enhanced position coordinates when using the ch...
Long range low power is a family of technologies promising to connect thousands of sensors to the fu...
Distance bounding protocols make it possible to determine a trusted upper bound on the distance betw...
Abstract—The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15.4a standard for wire...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
So far, the problem of positioning and distance measurements in wireless networks has been studied i...
To provide high ranging precision in multipath environments, a ranging protocol should find the firs...
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks ...
Distance bounding protocols are secure protocols to determine an upper bound to the distance between...
Recently, researchers have proposed a number of ranging and positioning techniques for wireless netw...
Multicarrier phase-based ranging is fast emerging as a cost-optimized solution for a wide variety of...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
Abstract—The problem of measuring the distance between two electronic devices in the presence of an ...
International audience802.11 Fine Timing Measurement is an indoor ranging technique. Because it is u...
This paper develops an anti-collision algorithm for localization of multiple chirp-spread-spectrum (...
In this paper, we propose an algorithm for acquiring enhanced position coordinates when using the ch...
Long range low power is a family of technologies promising to connect thousands of sensors to the fu...
Distance bounding protocols make it possible to determine a trusted upper bound on the distance betw...
Abstract—The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15.4a standard for wire...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
So far, the problem of positioning and distance measurements in wireless networks has been studied i...
To provide high ranging precision in multipath environments, a ranging protocol should find the firs...
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks ...
Distance bounding protocols are secure protocols to determine an upper bound to the distance between...