Publication | Closed Access
Are We Really Close? Verifying Proximity in Wireless Systems
56
Citations
6
References
2017
Year
Current Proximity VerificationEngineeringInformation SecurityWireless LanReally CloseWireless ComputingLocalizationHardware SecurityDistance Modification AttacksWireless SecurityLocation AwarenessSecure CommunicationWireless SystemsNetwork SecurityData PrivacyMobile ComputingComputer ScienceData SecurityCryptographyPhysical SecurityModification Attacks
Current proximity verification and ranging systems are prone to distance modification attacks that can lead to loss of property or even human life. The authors survey the various approaches currently used to determine proximity and analyze their resilience against distance modification attacks. Drawing on these observations, they offer suggestions for design requirements that might help systems prove proximity with high-security guarantees.
| Year | Citations | |
|---|---|---|
Page 1
Page 1