UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks

نویسندگان

  • Mridula Singh
  • Patrick Leu
  • Srdjan Capkun
چکیده

Physical layer attacks allow attackers to manipulate (spoof) ranging and positioning. These attacks had real world impact and allowed car thefts, executions of unauthorised payments and manipulation of navigation. UWB impulse radio (UWB-IR) has emerged as a prominent technique for precise ranging that allows high operating distances despite power constraints by transmitting multi-pulse symbols. Unfortunately, longer symbols make UWB-IR vulnerable to physical layer attacks. Currently, none of the existing systems is precise, performant and secure at the same time. We present UWB with Pulse Reordering (UWB-PR), the first modulation scheme that secures distance measurement between two mutually trusted devices against all physical-layer attacks without sacrificing performance and irrespective of the environment or attacker. We analyze the security of UWB-PR under the attacker that fully controls the communication channel and show that UWB-PR resists even such a strong attacker. We evaluate UWBPR within an UWB system building on IEEE 802.15.4f and show that it achieves distances of up to 93m with 10cm precision (LoS).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outage Probability Bound and Diversity Gain for Ultra-Wideband Multiple-Access Relay Channels with Correlated Noises

In this paper, Ultra-wideband (UWB) multiple access relay channel with correlated noises at the relay and receiver is investigated. We obtain outer and inner bounds for the IEEE 802.15.3a UWB multiple access relay channel, and also, a diversity gain bound. Finally, we evaluate some results numerically and show that noise correlation coefficients play important role in determining relay position.

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Analysis and Simulation of Orthogonal UWB Pulse for Modulation Scheme and Transmission

A promising coherent Impulse-Radio Ultra-Wideband (IR-UWB) communication system with one relay. IR-UWB communications attracted significant attention as a strong candidate solution for short-range high data-rate applications. UWB is a modulation and data transmission method which has potential to change the wireless picture entirely in future. The non-orthogonal cooperation in narrow-band wirel...

متن کامل

Ultra Wide Band Ad-Hoc Sensor Networks: A Multi-Layer Analysis. (Réseaux de capteurs ad-hoc Ultra Wide Band : une analyse multi couche)

and Thesis Overview Abstract The Ultra Wide Band (UWB) technology represents a promising approach allowing the development of new types of wireless Local Area Networks (LANs) and Wireless Sensor Networks (WSNs). For twenty years, UWB has been an active field of research and it could be the physical layer for future multiple access wireless networks with very high bit rates, as well as low bit r...

متن کامل

Securing Wireless Communication Against Dictionary Attacks Without Using PKI

Geethakumar, Sarath. M.S., Purdue University, May, 2010. Securing Wireless Communication Against Dictionary Attacks Without Using PKI. Major Professors: Samuel S. Wagstaff Jr. and Melissa Dark. Security of 802.11x wireless encryption standards are increasingly coming under scrutiny as compared to other security protocols and standards. The attacks on 802.11x wireless security protocols are exac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017