Securing UAV flying base station for mobile networking: A review
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …
its connectivity coverage and improve its communication channel quality to achieve a …
Distributed localization with complemented RSS and AOA measurements: Theory and methods
Remarkable progress in radio frequency and micro-electro-mechanical systems integrated
circuit design over the last two decades has enabled the use of wireless sensor networks …
circuit design over the last two decades has enabled the use of wireless sensor networks …
Hold the door! fingerprinting your car key to prevent keyless entry car theft
Recently, the traditional way to unlock car doors has been replaced with a keyless entry
system which proves more convenient for automobile owners. When a driver with a key fob …
system which proves more convenient for automobile owners. When a driver with a key fob …
UWB with pulse reordering: Securing ranging against relay and physical-layer attacks
Physical-layer attacks allow attackers to manipulate (spoof) ranging and positioning. These
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
attacks had real-world impact and allowed car thefts, executions of unauthorized payments …
Towards secure and scalable UWB-based positioning systems
M Stocker, B Großwindhager… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
Positioning systems based on ultra-wideband (UWB) technology are becoming ubiquitous
and enable a plethora of attractive Internet of Things applications, ranging from smart access …
and enable a plethora of attractive Internet of Things applications, ranging from smart access …
On the performance of ieee 802.15. 4z-compliant ultra-wideband devices
Since the introduction of the IEEE 802.15. 4z standard, several new-generation ultra-
wideband platforms have been marketed, such as the Apple U1, the NXP Trimension, and …
wideband platforms have been marketed, such as the Apple U1, the NXP Trimension, and …
A min-max optimization-based approach for secure localization in wireless networks
S Tomic, M Beko - IEEE Transactions on Vehicular Technology, 2023 - ieeexplore.ieee.org
Range-based localization of a target device in wireless networks in the presence of
malicious attackers that tend to disrupt the localization process by counterfeiting (spoofing) …
malicious attackers that tend to disrupt the localization process by counterfeiting (spoofing) …
Here, there, and everywhere: security analysis of wi-fi fine timing measurement
Today, an increasing number of applications rely on location and proximity information to
deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE …
deliver services. With the introduction of Wi-Fi Fine Timing Measurement (FTM) in the IEEE …
Secure 5G positioning with truth discovery, attack detection, and tracing
The fifth-generation (5G) cellular network is expected to provide submeter positioning
accuracy without draining the battery of user equipment (UE). As a solution, ultradense …
accuracy without draining the battery of user equipment (UE). As a solution, ultradense …
Message time of arrival codes: A fundamental primitive for secure distance measurement
Secure distance measurement and therefore secure Time-of-Arrival (ToA) measurement is
critical for applications such as contactless payments, passive-keyless entry and start …
critical for applications such as contactless payments, passive-keyless entry and start …