Suche
Ergebnisse
-
-
For Some Eyes Only
(2012)Technical report / Systems Group, Department of Computer Science, ETH ZurichReport -
-
Physical-layer identification of wireless sensor nodes
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIdentification of wireless sensor nodes based on the physical characteristics of their radio transmissions can potentially provide additional layer of security in all-wireless multi-hop sensor networks. Reliable identification can be means for detection and/or prevention of wormhole, Sybil and replication attacks, and for complementing cryptographic message authentication protocols. In this paper, we propose an improved method for capturing ...Report -
iPhone and iPod Location Spoofing
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIn this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system [41], available on PCs and used on a number of mobile platforms, including Apple’s iPod touch and iPhone [1]. We demonstrate that this system is vulnerable to location spoofing and location database manipulation attacks. We further discuss approaches for securing Skyhook and similar WLAN-based positioning ...Report -
UWB-based secure ranging and localization
(2012)Technical Report / ETH Zurich, Department of Computer ScienceReport -
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
(2012)Technical Report / ETH Zurich, Department of Computer ScienceWe present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All ...Report