2017
DOI: 10.1109/msp.2017.56
|View full text |Cite
|
Sign up to set email alerts
|

Are We Really Close? Verifying Proximity in Wireless Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Existing ranging systems are typically vulnerable to one of three types of attacks: Relay, Cicada [27] and Early-Detect/Late-Commit. These are illustrated in Figure 3.…”
Section: B Physical-layer Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing ranging systems are typically vulnerable to one of three types of attacks: Relay, Cicada [27] and Early-Detect/Late-Commit. These are illustrated in Figure 3.…”
Section: B Physical-layer Attacksmentioning
confidence: 99%
“…techniques have been shown to be vulnerable to physicallayer attacks [27]; most notable examples include spoofing attacks on GPS [24], [19], relay attacks on passive entry/start systems in cars [15] and credit card payments [16]. Those vulnerabilities have real-world implications, as shown by a recent car theft that found widespread media attention [5].…”
Section: Introductionmentioning
confidence: 99%
“…These relay attack prevention methods focus on improving the proximity detection. Ranganathan et al [10] concluded that various attacks could exploit the proximity verification method.…”
Section: Introductionmentioning
confidence: 99%
“…Numerous wireless ranging and localization techniques were developed in the last decade based on time of arrival, time difference of arrival, phase, RSSI measurements, etc. However, these techniques have shown to be vulnerable to physical-layer attacks [8]; most notable examples include spoofing attacks on GPS, relay attacks on passive entry/start systems in cars [5] and credit card payments. Those vulnerabilities have real world implications as shown by a recent car theft that found widespread media attention [2].…”
Section: Introductionmentioning
confidence: 99%