A survey on indoor positioning security and privacy
Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …
marketing, mobile navigation, etc., there has been considerable interest in indoor …
Time for Change: How Clocks Break {UWB} Secure Ranging
C Anliker, G Camurati, S Čapkun - 32nd USENIX Security Symposium …, 2023 - usenix.org
Due to its suitability for wireless ranging, Ultra-Wide Band (UWB) has gained traction over
the past years. UWB chips have been integrated into consumer electronics and considered …
the past years. UWB chips have been integrated into consumer electronics and considered …
Are we really close? Verifying proximity in wireless systems
A Ranganathan, S Capkun - IEEE Security & Privacy, 2017 - ieeexplore.ieee.org
Current proximity verification and ranging systems are prone to distance modification attacks
that can lead to loss of property or even human life. The authors survey the various …
that can lead to loss of property or even human life. The authors survey the various …
UWB with pulse reordering: Securing ranging against relay and physical-layer attacks
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
Authentication for drone delivery through a novel way of using face biometrics
J Sharp, C Wu, Q Zeng - Proceedings of the 28th Annual International …, 2022 - dl.acm.org
Drone delivery, which makes use of unmanned aerial vehicles (UAVs) to deliver or pick up
packages, is an emerging service. To ensure that a package is picked up by a legitimate …
packages, is an emerging service. To ensure that a package is picked up by a legitimate …
G2Auth: secure mutual authentication for drone delivery without special user-side hardware
Because of its cost effectiveness and timeliness, package delivery using unmanned aerial
vehicles (UAVs), called drone delivery, is drawing growing attention. Authentication is critical …
vehicles (UAVs), called drone delivery, is drawing growing attention. Authentication is critical …
Here, there, and everywhere: security analysis of wi-fi fine timing measurement
Today, an increasing number of applications rely on location and proximity information to
deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE …
deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE …
Message time of arrival codes: A fundamental primitive for secure distance measurement
Secure distance measurement and therefore secure Time-of-Arrival (ToA) measurement is
critical for applications such as contactless payments, passive-keyless entry and start …
critical for applications such as contactless payments, passive-keyless entry and start …
Comparison between an RSSI-and an MCPD-Based BLE Indoor Localization System
IPS is a crucial technology that enables medical staff and hospital management to
accurately locate and track persons or assets inside medical buildings. Among other …
accurately locate and track persons or assets inside medical buildings. Among other …
SecBeam: Securing mmWave beam alignment against beam-stealing attacks
Millimeter wave (mmWave) communications employ narrow-beam directional transmissions
to compensate for the high path loss. The beam alignment process is crucial to establishing …
to compensate for the high path loss. The beam alignment process is crucial to establishing …