International audienceRelay attacks pose a real threat to the security of wireless communications. Distance bounding protocols have been designed to thwart these attacks. In this paper, we study the way to adapt distance bounding protocols to time-hopping ultra wideband (TH-UWB) radios. Two protocols are proposed which are based on the milestones of the TH-UWB radio: the time-hopping sequence and the mapping code. The security and the different merits of those protocols are analyzed
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
International audienceRelay attacks pose a real threat to the security of wireless communications. D...
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which...
Relay attacks represent nowadays a critical threat to authentication protocols. They cab be thwarted...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
Distance bounding protocols make it possible to determine a trusted upper bound on the distance betw...
Due to the shared nature of wireless medium, wireless communications are more vulnerable to security...
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks ...
Abstract — In this paper, we present a simple interference mitigation solution for coexistence of Ul...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
Location information can be used to enhance mutual entity authentication protocols in wireless ad-ho...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...
International audienceRelay attacks pose a real threat to the security of wireless communications. D...
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which...
Relay attacks represent nowadays a critical threat to authentication protocols. They cab be thwarted...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
Distance bounding protocols make it possible to determine a trusted upper bound on the distance betw...
Due to the shared nature of wireless medium, wireless communications are more vulnerable to security...
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks ...
Abstract — In this paper, we present a simple interference mitigation solution for coexistence of Ul...
Relay attacks pose a serious threat to the security of radio frequency identification systems. The a...
International audienceNFC and RFID are technologies that are more and more present in our life. Thes...
Location information can be used to enhance mutual entity authentication protocols in wireless ad-ho...
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as 'm...
Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candida...
Abstract. Smartcard-based protocols represent an increasingly large share of the wireless authentica...