2017
DOI: 10.1007/978-3-319-66787-4_24
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Carrier Phase-Based Ranging

Abstract: Multicarrier phase-based ranging is fast emerging as a cost-optimized solution for a wide variety of proximitybased applications due to its low power requirement, low hardware complexity and compatibility with existing standards such as ZigBee and 6LoWPAN. Given potentially critical nature of the applications in which phasebased ranging can be deployed (e.g., access control, asset tracking), it is important to evaluate its security guarantees. Therefore, in this work, we investigate the security of multicarrie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
28
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(29 citation statements)
references
References 29 publications
1
28
0
Order By: Relevance
“…Accurate distance measurement can also be achieved using Narrow-Band radio technology, such as, Bluetooth Low Energy (BLE) using signals' phase information [ZRG + 19, BRGD20]. However, phasebased ranging solutions are also vulnerable to manipulation, such as, phase slope rollover attacks, as pointed out by Ólafsdóttir, Ranganathan, and Capkun in [ORC17]. It is worth mentioning, though, that phase manipulation attacks are more difficult to execute in practice, due to the typical wide radiation-pattern of antennae and reflections in the propagation path of radio signals (multipath).…”
Section: Introductionmentioning
confidence: 99%
“…Accurate distance measurement can also be achieved using Narrow-Band radio technology, such as, Bluetooth Low Energy (BLE) using signals' phase information [ZRG + 19, BRGD20]. However, phasebased ranging solutions are also vulnerable to manipulation, such as, phase slope rollover attacks, as pointed out by Ólafsdóttir, Ranganathan, and Capkun in [ORC17]. It is worth mentioning, though, that phase manipulation attacks are more difficult to execute in practice, due to the typical wide radiation-pattern of antennae and reflections in the propagation path of radio signals (multipath).…”
Section: Introductionmentioning
confidence: 99%
“…Unlike logical-layer attacks that use manipulations of message bits, physical-layer attacks involve the manipulation of signal characteristics with the goal of fooling the receiver into decoding incorrect bits or incorrectly measuring signal phase, amplitude or time of arrival. A number of ranging systems have been shown to be vulnerable to physical-layer attacks: e.g., UWB 802.15.4a to Cicada attack [25], Phase ranging [3] to phase manipulation [23] and early detect / late commit (ED/LC) [12], Chirp Spread Spectrum to ED/LC [28]. These attacks are effective despite authentication and distance-bounding protocols [8], [20], since they target the physical layer and do not change the message content.…”
Section: Introductionmentioning
confidence: 99%
“…Unlike logical-layer attacks that use manipulations of (bits of) messages, physical-layer attacks involve the manipulation of signal characteristics with a goal of fooling the receiver into decoding incorrect bits or incorrectly measuring signal phase, amplitude, time of arrival, etc. A number of ranging systems have been shown to be vulnerable to physical layer attacks: e.g., UWB 802.15.4a to Cicada attack [7], Phase ranging to phase manipulation [6] and early detect / late commit (ED/LC) [4], Chirp Spread Spectrum to ED/LC [9]. These attacks are effective despite authentication and distance bounding protocols [3], since they target the physical layer and don't change the message content.…”
Section: Introductionmentioning
confidence: 99%