Securing UAV flying base station for mobile networking: A review

SY Chang, K Park, J Kim, J Kim - Future Internet, 2023 - mdpi.com
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …

Distributed localization with complemented RSS and AOA measurements: Theory and methods

S Tomic, M Beko, LM Camarinha-Matos, LB Oliveira - Applied Sciences, 2019 - mdpi.com
Remarkable progress in radio frequency and micro-electro-mechanical systems integrated
circuit design over the last two decades has enabled the use of wireless sensor networks …

Hold the door! fingerprinting your car key to prevent keyless entry car theft

K Joo, W Choi, DH Lee - arXiv preprint arXiv:2003.13251, 2020 - arxiv.org
Recently, the traditional way to unlock car doors has been replaced with a keyless entry
system which proves more convenient for automobile owners. When a driver with a key fob …

UWB with pulse reordering: Securing ranging against relay and physical-layer attacks

M Singh, P Leu, S Capkun - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …

Towards secure and scalable UWB-based positioning systems

M Stocker, B Großwindhager… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
Positioning systems based on ultra-wideband (UWB) technology are becoming ubiquitous
and enable a plethora of attractive Internet of Things applications, ranging from smart access …

On the performance of ieee 802.15. 4z-compliant ultra-wideband devices

M Stocker, H Brunner, M Schuh… - 2022 Workshop on …, 2022 - ieeexplore.ieee.org
Since the introduction of the IEEE 802.15. 4z standard, several new-generation ultra-
wideband platforms have been marketed, such as the Apple U1, the NXP Trimension, and …

A min-max optimization-based approach for secure localization in wireless networks

S Tomic, M Beko - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
Range-based localization of a target device in wireless networks in the presence of
malicious attackers that tend to disrupt the localization process by counterfeiting (spoofing) …

Here, there, and everywhere: security analysis of wi-fi fine timing measurement

D Schepers, M Singh, A Ranganathan - … of the 14th ACM Conference on …, 2021 - dl.acm.org
Today, an increasing number of applications rely on location and proximity information to
deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE …

Secure 5G positioning with truth discovery, attack detection, and tracing

Y Li, S Liu, Z Yan, RH Deng - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The fifth-generation (5G) cellular network is expected to provide submeter positioning
accuracy without draining the battery of user equipment (UE). As a solution, ultradense …

Message time of arrival codes: A fundamental primitive for secure distance measurement

P Leu, M Singh, M Roeschlin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Secure distance measurement and therefore secure Time-of-Arrival (ToA) measurement is
critical for applications such as contactless payments, passive-keyless entry and start …