![]() Message time of arrival codes: A fundamental primitive for secure distance measurement. ![]() ![]() In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, SIGCOMM '15, page 269-282, New York, NY, USA, 2015. Spotfi: Decimeter level localization using wifi. Ieee standard for low-rate wireless networks. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec '08, page 194-202, New York, NY, USA, 2008. Attacks on time-of-flight distance bounding channels. IACR Cryptology ePrint Archive, 2010:332, 2010. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Third ACM Conference on Wireless Network Security, WiSec '10, page 117-128, New York, NY, USA, 2010. Effectiveness of distance-decreasing attacks against impulse radio ranging. Ranging with ultrawide bandwidth signals in multipath environments. Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Bonfante, editors, Foundations and Practice of Security, pages 29-49, Cham, 2016. Survey of distance bounding protocols and threats. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, pages 344-359, Berlin, Heidelberg, 1994. Through extensive experimental evaluations (and simulations for scalability to over 100 reflectors) we demonstrate an accuracy below 20cm on a wide range of SNR (as low as 0dB), spectrum 25MHz-100MHz, with bursts as short as 5us. ![]() The protocol design, and cryptographically generated/detected signals, and randomized timing of transmissions, provide stealth and security against denial of service, sniffing, and distance manipulation attacks. We demonstrate that it can be implemented on popular SDR platforms FPGA and/or hosts (with minimal FPGA modifications). We exploit a set of RF techniques such as upsampling and successive interference cancellation to achieve high accuracy and scalability to tens of reflectors even when operating over narrow bands of spectrum. Its spectral-flexibility, and low-power short ranging bursts enable co-existence with existing systems such as in the 2.4GHz ISM band. In this paper, we propose a design of a secure broadcast ranging system with unique features and techniques. Secure ranging is poised to play a critical role in several emerging applications such as self-driving cars, unmanned aerial systems, wireless IoT devices, and augmented reality. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |