Location Privacy of Distance Bounding Protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As such, distance bounding protocols are executed frequently, e.g., to keep node locations up to date, etc. We analyze dist...
Main Authors: | Rasmussen, K, Čapkun, S |
---|---|
Format: | Conference item |
Published: |
ACM
2008
|
Similar Items
Similar Items
-
Distance Hijacking Attacks on Distance Bounding Protocols
by: Cremers, C, et al.
Published: (2012) -
Distance hijacking attacks on distance bounding protocols
by: Rasmussen, K, et al.
Published: (2012) -
Realization of RF Distance Bounding
by: Rasmussen, K, et al.
Published: (2010) -
Security of distance-bounding: a survey
by: Avoine, G, et al.
Published: (2018) -
Secure Location Verification with Hidden and Mobile Base Stations
by: Čapkun, S, et al.
Published: (2008)