2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5684000
|View full text |Cite
|
Sign up to set email alerts
|

Distance Bounding Protocols on TH-UWB Radios

Abstract: Relay attacks pose a real threat to the security of wireless communications. Distance bounding protocols have been designed to thwart these attacks. In this paper, we study the way to adapt distance bounding protocols to time-hopping ultra wide band (TH-UWB) radios. Two protocols are proposed which are based on the milestones of the TH-UWB radio: the time-hopping sequence and the mapping code. The security and the different merits of those protocols are analyzed

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…This kind of attacks is first introduced in [8]. By using the idea of [8], we improve some attacks on DF on [42,36,7,50,34,38,51,22,20,21] and one on MiM on [56]. We detail only one attack on DF and the one on MiM, but for the other protocols we give the PRF construction to mount a successful attack.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…This kind of attacks is first introduced in [8]. By using the idea of [8], we improve some attacks on DF on [42,36,7,50,34,38,51,22,20,21] and one on MiM on [56]. We detail only one attack on DF and the one on MiM, but for the other protocols we give the PRF construction to mount a successful attack.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
“…As we can see in Table 2, many of the listed protocols use a PRF [29,47,33,42,44,5,37,36,7,45,50,4,56,28,34,55,38,41,31,12,25,51,[20][21][22]. It is possible to mount some attacks if the PRF used follows a certain form.…”
Section: Improvements Of Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…An ID-based distance bounding protocol is implemented on proprietary IR radios in [20]. In [21], the authors design a time-hoppingbased IR PHY that is secure against external, but not internal attacks. Beyond IR-UWB, DB PHYs tailored to narrow-band RFID systems are proposed in [12], [22], [23], and a DB PHY for smartcards (wire-line) is introduced in [24].…”
Section: Introductionmentioning
confidence: 99%