An UWB ranging-based localization strategy with internal attack immunity

Yiyin Wang, Xiaoli Ma, Geert Leus

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

9 Citations (Scopus)

Abstract

The two-way ranging (TWR) protocol has been adopted in the IEEE 802.15.4a standard for wireless networks. However, it is vulnerable to malicious attacks (e.g., internal attacks). An internal ranging attack here refers to a fraudulent timestamp report. For example, a compromised sensor node tampers its timestamp report to spoof its processing time in order to malignly decrease or enlarge distance measurements, or a sensor node submits an inaccurate timestamp report due to the clock drift. In this paper, we propose an UWB ranging-based localization strategy, which is immune to the internal ranging attack. Regardless of the honesty of the timestamp report from a sensor node, we could still estimate the position of the sensor node accurately. We show how to defeat a ranging attack by taking it into account in the development of a localization algorithm.
Original languageEnglish
Title of host publicationProceedings of 2010 IEEE International Conference on Ultra-Wideband, ICUWB 2010
EditorsW Hong, G Yang, K Gu
Place of PublicationLos Alamitos, CA
PublisherIEEE Society
Pages1-4
Number of pages4
ISBN (Print)978-1-4244-5305-4
DOIs
Publication statusPublished - 2010
EventIEEE International Conference on Ultra-Wideband , ICUWB 2010 - Nanjing, China
Duration: 20 Sep 201023 Sep 2010

Conference

ConferenceIEEE International Conference on Ultra-Wideband , ICUWB 2010
CountryChina
CityNanjing
Period20/09/1023/09/10

Fingerprint Dive into the research topics of 'An UWB ranging-based localization strategy with internal attack immunity'. Together they form a unique fingerprint.

Cite this