With the development of new location-based services and the expected deployment of cyber-physical systems (e.g., autonomous cars and drones) the reliance on location and time information in critical applications will only increase...
ver más
¿Tienes un proyecto y buscas un partner? Gracias a nuestro motor inteligente podemos recomendarte los mejores socios y ponerte en contacto con ellos. Te lo explicamos en este video
Proyectos interesantes
AWISSENET
Ad hoc PAN and WIreless Sensor SEcure NETwork
3M€
Cerrado
PTQ2019-010655
EXTENSIÓN DE SEGURIDAD SOBRE TECNOLOGIAS IoT y SISTEMAS DE L...
77K€
Cerrado
TEC2013-47020-C2-2-R
COMUNICACIONES Y PROCESADO DE SEÑAL EN ESCENARIOS ADVERSOS -...
193K€
Cerrado
MAMONET
Massive MIMO for Securing Internet of Things Networks
214K€
Cerrado
SCOUT
Multitech SeCurity system for intercOnnected space control g...
3M€
Cerrado
POPSTAR
Reasoning about Physical properties Of security Protocols wi...
1M€
Cerrado
Información proyecto CSP
Duración del proyecto: 62 meses
Fecha Inicio: 2016-12-14
Fecha Fin: 2022-02-28
Fecha límite de participación
Sin fecha límite de participación.
Descripción del proyecto
With the development of new location-based services and the expected deployment of cyber-physical systems (e.g., autonomous cars and drones) the reliance on location and time information in critical applications will only increase. Today's positioning systems are vulnerable to location spoofing by which devices can cheat on their own positions or can manipulate the measured positions of other devices. This problem cannot be fixed by a simple upgrade - existing positioning systems rely on legacy distance measurement techniques and protocols that were designed without security considerations or with security as an after-thought. We therefore need a new approach to the design of positioning systems that takes security requirements into account from the very start, and also accounts for the way that positioning systems are built and used. This is a cross-layer endeavor. In this project we will address the following fundamental questions: (1) Physical Layer. How can we design the right distance measurement (i.e., distance bounding) techniques that provide resilience to physical-layer and logical-layer attacks but retain the performance (range, accuracy and speed of execution) of equivalent non-secure systems? We will extend the existing knowledge in terms of the attacker models as well as achievable limits of security and performance of distance measurement techniques under realistic attacker models. (2) Link Layer. What are the right Medium Access Control (MAC) protocols for secure positioning, what are their performance and scalability limits? (3) Systems. How can distance bounding be integrated in mobile platforms, especially with trusted execution environments. How can this integration strengthen the security of distance bounding and support its use in a wide range of applications?