[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wang et al., 2014 - Google Patents

Fingerprinting far proximity from radio emissions

Wang et al., 2014

View PDF
Document ID
8351888596052774771
Author
Wang T
Liu Y
Ligatti J
Publication year
Publication venue
Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 19

External Links

Snippet

As wireless mobile devices are more and more pervasive and adopted in critical applications, it is becoming increasingly important to measure the physical proximity of these devices in a secure way. Although various techniques have been developed to identify …
Continue reading at tao-wang.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W56/00Synchronization arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • H04W52/18TPC being performed according to specific parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel

Similar Documents

Publication Publication Date Title
Lazos et al. ROPE: Robust position estimation in wireless sensor networks
Wei et al. Jammer localization in multi-hop wireless network: A comprehensive survey
Rasmussen et al. Implications of radio fingerprinting on the security of sensor networks
US8989764B2 (en) Robust location distinction using temporal link signatures
Tippenhauer et al. Id-based secure distance bounding and localization
Leu et al. Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging
Leu et al. Message time of arrival codes: A fundamental primitive for secure distance measurement
JP2013532435A (en) Wireless communication security method, receiving apparatus and communication system for implementing the method
Flury et al. Effectiveness of distance-decreasing attacks against impulse radio ranging
Singh et al. {UWB-ED}: Distance Enlargement Attack Detection in {Ultra-Wideband}
Wang et al. Fingerprinting far proximity from radio emissions
Fang et al. Mimicry attacks against wireless link signature and new defense using time-synched link signature
Stocker et al. Towards secure and scalable UWB-based positioning systems
Kuhn et al. UWB impulse radio based distance bounding
Mayrhofer et al. On the Security of Ultrasound as Out-of-band Channel
Pirch et al. Introduction to impulse radio uwb seamless access systems
Tung et al. Analog man-in-the-middle attack against link-based packet source identification
Staat et al. Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging
Abidin et al. Secure, accurate, and practical narrow-band ranging system
Tippenhauer et al. UWB-based secure ranging and localization
Bauer et al. The directional attack on wireless localization-or-how to spoof your location with a tin can
Hussain et al. TIGHT: A cross-layer RF distance bounding realization for passive wireless devices
Wang et al. Far proximity identification in wireless systems
Dini et al. SecDEv: Secure distance evaluation in wireless networks
Capkun et al. Group Distance Bounding Protocols: (Short Paper)