Wang et al., 2014 - Google Patents
Fingerprinting far proximity from radio emissionsWang et al., 2014
View PDF- Document ID
- 8351888596052774771
- Author
- Wang T
- Liu Y
- Ligatti J
- Publication year
- Publication venue
- Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I 19
External Links
Snippet
As wireless mobile devices are more and more pervasive and adopted in critical applications, it is becoming increasingly important to measure the physical proximity of these devices in a secure way. Although various techniques have been developed to identify …
- 238000000034 method 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W56/00—Synchronization arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/18—TPC being performed according to specific parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lazos et al. | ROPE: Robust position estimation in wireless sensor networks | |
Wei et al. | Jammer localization in multi-hop wireless network: A comprehensive survey | |
Rasmussen et al. | Implications of radio fingerprinting on the security of sensor networks | |
US8989764B2 (en) | Robust location distinction using temporal link signatures | |
Tippenhauer et al. | Id-based secure distance bounding and localization | |
Leu et al. | Ghost Peak: Practical Distance Reduction Attacks Against {HRP}{UWB} Ranging | |
Leu et al. | Message time of arrival codes: A fundamental primitive for secure distance measurement | |
JP2013532435A (en) | Wireless communication security method, receiving apparatus and communication system for implementing the method | |
Flury et al. | Effectiveness of distance-decreasing attacks against impulse radio ranging | |
Singh et al. | {UWB-ED}: Distance Enlargement Attack Detection in {Ultra-Wideband} | |
Wang et al. | Fingerprinting far proximity from radio emissions | |
Fang et al. | Mimicry attacks against wireless link signature and new defense using time-synched link signature | |
Stocker et al. | Towards secure and scalable UWB-based positioning systems | |
Kuhn et al. | UWB impulse radio based distance bounding | |
Mayrhofer et al. | On the Security of Ultrasound as Out-of-band Channel | |
Pirch et al. | Introduction to impulse radio uwb seamless access systems | |
Tung et al. | Analog man-in-the-middle attack against link-based packet source identification | |
Staat et al. | Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging | |
Abidin et al. | Secure, accurate, and practical narrow-band ranging system | |
Tippenhauer et al. | UWB-based secure ranging and localization | |
Bauer et al. | The directional attack on wireless localization-or-how to spoof your location with a tin can | |
Hussain et al. | TIGHT: A cross-layer RF distance bounding realization for passive wireless devices | |
Wang et al. | Far proximity identification in wireless systems | |
Dini et al. | SecDEv: Secure distance evaluation in wireless networks | |
Capkun et al. | Group Distance Bounding Protocols: (Short Paper) |