An UWB ranging-based localization strategy with internal attack immunity

Conference Paper (2010)
Author(s)

Y. Wang (TU Delft - Signal Processing Systems, Georgia Institute of Technology)

Xiaoli Ma (Georgia Institute of Technology)

G. Leus (TU Delft - Signal Processing Systems)

Research Group
Signal Processing Systems
DOI related publication
https://doi.org/10.1109/ICUWB.2010.5615052
More Info
expand_more
Publication Year
2010
Language
English
Research Group
Signal Processing Systems
Pages (from-to)
1-4
ISBN (print)
978-1-4244-5305-4

Abstract

The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15.4a standard for wireless networks. However, it is vulnerable to malicious attacks (e.g., internal attacks). An internal ranging attack here refers to a fraudulent timestamp report. For example, a compromised sensor node tampers its timestamp report to spoof its processing time in order to malignly decrease or enlarge distance measurements, or a sensor node submits an inaccurate timestamp report due to the clock drift. In this paper, we propose an UWB ranging-based localization strategy, which is immune to the internal ranging attack. Regardless of the honesty of the timestamp report from a sensor node, we could still estimate the position of the sensor node accurately. We show how to defeat a ranging attack by taking it into account in the development of a localization algorithm.

No files available

Metadata only record. There are no files for this record.