Home > Achievements in Scientific Research > Paper Publications
Release time:2019-08-08
Hits:
Affiliation of Author(s):UESTC
Teaching and Research Group:CRFICS
Journal:IEEE Internet of Things Journal
Key Words:Authentication , distance attacks , distance-bounding (DB) , multihop
Indexed by:Applied Research
Document Code:10.1109/JIOT.2019.2900707
Volume:6
Issue:3
Page Number:5312 - 5323
Translation or Not:no
Date of Publication:2019-02-21
Distance bounding (DB) protocols are crucial solutions against “distance attacks.” Traditional one-hop DB protocols can estimate an upper-bound of the physical distance between two nodes within their communication range, but they fail when this distance exceeds their coverage. Recently, a two-hop DB protocol to verify the proximity of nodes beyond the first hop was proposed. Nonetheless, this approach is still lacking for meeting security requirements of multihop communication scenarios like ad-hoc wireless network. Motivated by this situation and considering security problems of a relay commu
Mobile browsing
No public
Address: Shahe Campus:No.4, Section 2, North Jianshe Road, 610054 | Qingshuihe Campus:No.2006, Xiyuan Ave, West Hi-Tech Zone, 611731 | Chengdu, Sichuan, P.R.China © 2010 University of Electronic Science and Technology of China. All Rights Reserved