Change search
ReferencesLink to record
Permanent link

Direct link
Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures
KTH, School of Electrical Engineering (EES), Communication Networks.
Show others and affiliations
2011 (English)In: IEEE Transactions on Wireless Communications, ISSN 1536-1276, Vol. 10, 1334-1344 p.Article in journal (Refereed) Published
Abstract [en]

Impulse Radio Ultra-Wideband, in particular the recent standard IEEE 802.15.4a, is a primary candidate for implementing distance bounding protocols, thanks to its ability to perform accurate indoor ranging. Distance bounding protocols allow two wireless devices to securely estimate the distance between themselves, with the guarantee that the estimate is an upper-bound on the actual distance. These protocols serve as building blocks in security-sensitive applications such as tracking, physical access control, or localization.We investigate the resilience of IEEE 802.15.4a to physical-communication-layer attacks that decrease the distance measured by distance bounding protocols, thus violating their security. We consider two attack types: malicious prover (internal) and distance-decreasing relay (external). We show that if the honest devices use energy-detection receivers (popular due to their low cost and complexity), then an adversary can perform highly effective internal and external attacks, decreasing the distance by hundreds of meters. However, by using more sophisticated rake receivers, or by implementing small modifications to IEEE 802.15.4a and employing energy-detection receivers with a simple countermeasure, honest devices can reduce the effectiveness of external distance-decreasing relay attacks to the order of 10m. The same is true for malicious prover attacks, provided that an additional modification to IEEE 802.15.4a is implemented.

Place, publisher, year, edition, pages
2011. Vol. 10, 1334-1344 p.
Keyword [en]
Security; ranging; distance bounding; impulse radio; ultra-wideband
National Category
Communication Systems
URN: urn:nbn:se:kth:diva-35573DOI: 10.1109/TWC.2011.020111.101219ISI: 000289841200036ScopusID: 2-s2.0-79955480673OAI: diva2:429015
ICT - The Next Generation
© 2011 IEEE. Personal use of the attached pdf is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Qc 20120220Available from: 2011-07-08 Created: 2011-07-01 Last updated: 2012-06-13Bibliographically approved

Open Access in DiVA

fulltext(426 kB)220 downloads
File information
File name FULLTEXT01.pdfFile size 426 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusIEEEXplore

Search in DiVA

By author/editor
Papadimitratos, Panagiotis
By organisation
Communication Networks
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 220 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 58 hits
ReferencesLink to record
Permanent link

Direct link