2018
DOI: 10.29007/8v3t
|View full text |Cite
|
Sign up to set email alerts
|

UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks

Abstract: Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation of navigation. UWB impulse radio (UWB-IR) has emerged as a prominent technique for precise ranging that allows high operating distances despite power constraints by transmitting multi-pulse symbols. Unfortunately, longer symbols make UWB-IR vulnerable to physical layer attacks. Currently, none of the existing syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 7 publications
0
30
0
Order By: Relevance
“…4.4.5 Cryptographic Protection. Prior works on secure ranging systems demonstrated that protecting exchanged data is insufficient, in addition, one needs to protect the measurement exchange [11,53]. As a result, using typical network protection (e.g., WPA3-Personal) is insufficient to fundamentally secure the protocol.…”
Section: Localization Systemsmentioning
confidence: 99%
“…4.4.5 Cryptographic Protection. Prior works on secure ranging systems demonstrated that protecting exchanged data is insufficient, in addition, one needs to protect the measurement exchange [11,53]. As a result, using typical network protection (e.g., WPA3-Personal) is insufficient to fundamentally secure the protocol.…”
Section: Localization Systemsmentioning
confidence: 99%
“…Since UWB is a distance-based protocol, it is vulnerable to physical layer attacks, such as the early detection and late commit (ED/LC) attack described in Singh et al [ 146 ].…”
Section: Security In Iomt Communication Protocolsmentioning
confidence: 99%
“…This aims to mitigate physical-layer attacks that exploit node distancing, while retaining the range and performance of the extended mode. According to Singh et al [ 146 ], UWB with pulse reordering (UWB-PR) is the first modulation technique to prevent ED/LC attacks independently of the communication range offered.…”
Section: Security In Iomt Communication Protocolsmentioning
confidence: 99%
“…However, several researches show that the range measurement in the current technology is prone to external attacks. Francillon et al [ 15 ] present a relay attack, Taponecco et al [ 16 ] show a delay attack and Singh et al [ 17 ] propose a modulation scheme that secures the distance measurement against relay attack. The EiR project [ 1 ] brings a lot of improvements, including UWB reference pulse shape, preamble symbols revision, addition of scrambled timestamp sequence for secure ranging, an increase in data rate and PHY payload length, and the modification and addition of a new MAC primitive for key management.…”
Section: Literature Reviewmentioning
confidence: 99%