Back to Results
First PageMeta Content
Avionics / Communications protocol / Data transmission / Protocols / Public-key cryptography / Transmission Control Protocol / Global Positioning System / Telecommunication / UMAC / Technology / Cryptography / Data


Secure Ranging With Message Temporal Integrity ˇ Nils Ole Tippenhauer, Kasper Bonne Rasmussen, and Srdjan Capkun Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland {tinils, kasperr, capkuns}@inf.ethz.ch
Add to Reading List

Document Date: 2009-12-05 06:44:31


Open Document

File Size: 526,08 KB

Share Result on Facebook

Company

MTI / /

Currency

pence / /

/

Facility

dAB dAM / /

IndustryTerm

trusted devices / secure ranging relevant in systems / nominal communications / higher level protocols / ultrasonic ranging systems / distance measurement protocol / Typical radio hardware / authenticated ranging protocol / conventional systems / given protocol / authenticated ranging protocols / data communication systems / distance bounding protocol / mutual communications / secure localization protocols / local processing time / radio technology / wireless networks / conventional non-secure ranging protocol / dedicated positioning hardware / energy / carrier frequency / localization applications / carrier frequency periods / carrier wavelength / nonnegligible processing delay / challengeresponse protocol / sensor networks / secure ranging protocols / secure ranging protocol / radio frequency technology / radio hardware / wireless communication channels / localization algorithms / message temporal integrity protocol / maximal processing delay / wireless distance measurements / vehicular networks / distance-bounding protocols / challenge-response protocol / time-of-arrival systems / security protocols / Distance bounding protocols / localization systems / sensor network / be prevented using secure ranging protocols / /

Organization

Srdjan Capkun Department of Computer Science / /

Person

Srdjan Capkun / Nils Ole Tippenhauer / /

Technology

B. The protocol / secure ranging protocol / challenge-response protocol / A. The protocol / secure localization protocols / using localization algorithms / GPS / Distance bounding protocols / security protocols / secret key / operating system / DESR protocol / same protocols / authenticated ranging protocol / secure ranging protocols / distance measurement protocol / challengeresponse protocol / existing protocols / RF-ranging protocols / message temporal integrity protocol / WLAN / Delay Evident Secure Ranging protocol / LMTI protocol / 4.4 Replay Attacks Our protocol / ranging protocol / authenticated ranging protocols / conventional non-secure ranging protocol / radio frequency technology / distance-bounding protocols / radio frequency / given protocol / higher level protocols / trusting distance bounding protocol / /

SocialTag