Secure Distance Bounding Protocol on TH-UWB

被引:0
|
作者
Miri, Jamel [1 ]
Nsiri, Bechir [2 ]
Bouallegue, Ridha [1 ]
机构
[1] SupCom, InnovCOM Lab, Ariana, Tunisia
[2] ENIT, SysCom Lab, Tunis, Tunisia
关键词
Distance Bounding (DB); Time-hopping ultra-wideband (TH-UWB); Terrorist Fraud;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the nature of the shared radio channel, wireless communication suffers from different available attacks. To remind against these attacks, distance bounding protocols are the most popular counter measures. In this paper, we proposed a novel protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the secure distance bounding protocols to time-hopping ultra-wideband (TH-UWB) radios. To ameliorate the performances of the proposed protocol in terms of communication security in ultra-wideband (TH-UWB) radios, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the proposed protocols are analyzed.
引用
收藏
页码:5 / 9
页数:5
相关论文
共 50 条
  • [31] TH-UWB RECEIVER BASED ON TWO PDFS APPROXIMATION IN MULTIUSER SYSTEMS
    Chen, Wang
    Gao, Qiang
    Xiong, Huagang
    Fei, Li
    Li, Qiong
    PROGRESS IN ELECTROMAGNETICS RESEARCH-PIER, 2013, 137 : 101 - 116
  • [32] Performance of orthogonal based modulation schemes for TH-UWB communication systems
    Majhi, Sudhan
    Madhukumar, A. S.
    Premkumar, A. B.
    IEICE ELECTRONICS EXPRESS, 2007, 4 (08): : 238 - 244
  • [33] A low complexity simulation algorithm for TH-UWB MMSE RAKE receiver
    Marjanovic, Marina
    Borrallo, Jose Manuel Paez
    2006 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2006, : 702 - +
  • [34] Proposal of a new Punctured Turbo Coding scheme for TH-UWB communications
    Chiti, F
    Fantacci, R
    Marabissi, D
    Innocenti, L
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 3861 - 3865
  • [35] Multi-Rate Resource Allocations for TH-UWB Wireless Communications
    Mary, Philippe
    Fijalkow, Inbar
    Poulliat, Charly
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (12) : 4470 - 4481
  • [36] Local polynomial estimator for narrowband, interference suppression in TH-UWB systems
    Zhou, Yongdao
    Ma, Hong
    Wang, Huiqi
    Lv, Wangyong
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 43 (04) : 1379 - 1388
  • [37] Local polynomial estimator for narrowband interference suppression in TH-UWB systems
    Yongdao Zhou
    Hong Ma
    Huiqi Wang
    Wangyong Lv
    Wireless Personal Communications, 2007, 43 : 1379 - 1388
  • [38] Multiuser Detections for TH-UWB Systems with M-ary PPM
    Su, Szu-Lin
    Lin, Wen-Jun
    Pan, Yi-Ching
    Lin, Yung-Chuan
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 468 - 471
  • [39] Key establishment using secure distance bounding protocols
    Singelee, Dave
    Preneel, Bart
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521
  • [40] ID-Based Secure Distance Bounding and Localization
    Tippenhauer, Nils Ole
    Capkun, Srdjan
    COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 621 - 636