{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:19Z","timestamp":1750220599009,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,6]]},"DOI":"10.1145\/3410992.3410994","type":"proceedings-article","created":{"date-parts":[[2021,2,21]],"date-time":"2021-02-21T01:25:42Z","timestamp":1613870742000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning"],"prefix":"10.1145","author":[{"given":"Baptiste","family":"Pestourie","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, Grenoble, Valence"}]},{"given":"Vincent","family":"Beroulle","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, Grenoble, Valence"}]},{"given":"Nicolas","family":"Fourty","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, Grenoble, Valence"}]}],"member":"320","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"88","article-title":"A Note on Design Flaws in One Aggregated-Proof Based Hierarchical Authentication Scheme for The Internet of Things","volume":"5","author":"Bayat M.","year":"2016","unstructured":"Bayat , M. , Chen , M. , Chrysoulas , C. , Lee , C. , Lin , I. , Martinez , G. and Sheng , M. 2016 . A Note on Design Flaws in One Aggregated-Proof Based Hierarchical Authentication Scheme for The Internet of Things . International Journal of Electronics and Information Engineering. 5 , 2 (2016), 88 -- 92 . Bayat, M., Chen, M., Chrysoulas, C., Lee, C., Lin, I., Martinez, G. and Sheng, M. 2016. A Note on Design Flaws in One Aggregated-Proof Based Hierarchical Authentication Scheme for The Internet of Things. International Journal of Electronics and Information Engineering. 5, 2 (2016), 88--92.","journal-title":"International Journal of Electronics and Information Engineering."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2018.00007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Yuan Y. Huo L. Wang Z. and Hogrefe D. 2018. Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks. IEEE Access. 6 (May 2018)  Yuan Y. Huo L. Wang Z. and Hogrefe D. 2018. Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks. IEEE Access . 6 (May 2018)","DOI":"10.1109\/ACCESS.2018.2836898"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3929\/ethz-a-006708714"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC","author":"Pestourie B.","year":"2019","unstructured":"Pestourie , B. , Beroulle , V. and Fourty , N . 2019. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study . IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ( 2019 ). Pestourie, B., Beroulle, V. and Fourty, N. 2019. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC (2019)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498103"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U. S\u00f6lter J. and Sehnke F. 2009. On the Foundations of Physical Unclonable Functions.  R\u00fchrmair U. S\u00f6lter J. and Sehnke F. 2009. On the Foundations of Physical Unclonable Functions .","DOI":"10.1145\/1866307.1866335"},{"key":"e_1_3_2_1_9_1","volume-title":"GLOBECOM - IEEE Global Telecommunications Conference","author":"Lanze F.","year":"2012","unstructured":"Lanze , F. , Panchenko , A. , Braatz , B. and Zinnen , A . 2012. Clock skew based remote device fingerprinting demystified . GLOBECOM - IEEE Global Telecommunications Conference ( 2012 ), 813--819. Lanze, F., Panchenko, A., Braatz, B. and Zinnen, A. 2012. Clock skew based remote device fingerprinting demystified. GLOBECOM - IEEE Global Telecommunications Conference (2012), 813--819."},{"key":"e_1_3_2_1_10_1","volume-title":"ACM International Conference Proceeding Series (Dec.","author":"Alaca F.","year":"2016","unstructured":"Alaca , F. and Van Oorschot, P.C. 2016. Device fingerprinting for augmenting web authentication: Classification and analysis of methods . ACM International Conference Proceeding Series (Dec. 2016 ), 289--301. Alaca, F. and Van Oorschot, P.C. 2016. Device fingerprinting for augmenting web authentication: Classification and analysis of methods. ACM International Conference Proceeding Series (Dec. 2016), 289--301."},{"key":"e_1_3_2_1_11_1","unstructured":"Time with focus on NTP and Slovenia: 2004. http:\/\/www.ijs.si\/time\/.  Time with focus on NTP and Slovenia: 2004. http:\/\/www.ijs.si\/time\/ ."},{"key":"e_1_3_2_1_12_1","unstructured":"DecaWave inc. 2017. DW1000 USER MANUAL.  DecaWave inc. 2017. DW1000 USER MANUAL ."},{"key":"e_1_3_2_1_13_1","unstructured":"Hancke G. A Practical Relay Attack on ISO 14443 Proximity Cards.  Hancke G. A Practical Relay Attack on ISO 14443 Proximity Cards ."},{"key":"e_1_3_2_1_14_1","unstructured":"Standards Committee of the IEEE Computer Society M. 2016. IEEE Std 802.15.4TM-2015 IEEE Standard for Low-Rate Wireless Networks.  Standards Committee of the IEEE Computer Society M. 2016. IEEE Std 802.15.4 TM -2015 IEEE Standard for Low-Rate Wireless Networks ."},{"key":"e_1_3_2_1_15_1","volume-title":"Effectiveness of distance-decreasing attacks against impulse radio ranging. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security","author":"Flury M.","year":"2010","unstructured":"Flury , M. , Poturalski , M. , Papadimitratos , P. , Hubaux , J.P. and Le Boudec , J.Y. 2010. Effectiveness of distance-decreasing attacks against impulse radio ranging. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security ( 2010 ), 117--128. Flury, M., Poturalski, M., Papadimitratos, P., Hubaux, J.P. and Le Boudec, J.Y. 2010. Effectiveness of distance-decreasing attacks against impulse radio ranging. WiSec'10 - Proceedings of the 3rd ACM Conference on Wireless Network Security (2010), 117--128."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Compagno A. Conti M. D'amico A.A. Dini G. Perazzo P. and Taponecco L. 2016. Modeling Enlargement Attacks Against UWB Distance Bounding Protocols.  Compagno A. Conti M. D'amico A.A. Dini G. Perazzo P. and Taponecco L. 2016. Modeling Enlargement Attacks Against UWB Distance Bounding Protocols .","DOI":"10.1109\/TIFS.2016.2541613"},{"key":"e_1_3_2_1_17_1","unstructured":"Ravikanth P.S. Benton S.A. and Instinte M. 2001. Physical One-Way Functions. MIT.  Ravikanth P.S. Benton S.A. and Instinte M. 2001. Physical One-Way Functions . MIT."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the ACM Symposium on Applied Computing","author":"Gassend B.","year":"2003","unstructured":"Gassend , B. , Clarke , D. , Van Dijk , M. and Devadas , S . 2003. Delay-based circuit authentication and applications . Proceedings of the ACM Symposium on Applied Computing ( 2003 ), 294--301. Gassend, B., Clarke, D., Van Dijk, M. and Devadas, S. 2003. Delay-based circuit authentication and applications. Proceedings of the ACM Symposium on Applied Computing (2003), 294--301."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_20_1","unstructured":"Bitcraze inc. Retrieved from: https:\/\/www.bitcraze.io\/crazyflie-2\/. Accessed: 2020-01-02.  Bitcraze inc. Retrieved from: https:\/\/www.bitcraze.io\/crazyflie-2\/ . Accessed: 2020-01-02."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Wang X. Member S. Hao P. and Hanzo L. 2016. Physical-Layer Authentication for Wireless Security Enhancement: Current Challenges and Future Developments.  Wang X. Member S. Hao P. and Hanzo L. 2016. Physical-Layer Authentication for Wireless Security Enhancement: Current Challenges and Future Developments .","DOI":"10.1109\/MCOM.2016.7498103"}],"event":{"name":"IoT '20: 10th International Conference on the Internet of Things","acronym":"IoT '20","location":"Malm\u00f6 Sweden"},"container-title":["Proceedings of the 10th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3410994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410992.3410994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:56Z","timestamp":1750195916000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410992.3410994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":21,"alternative-id":["10.1145\/3410992.3410994","10.1145\/3410992"],"URL":"https:\/\/doi.org\/10.1145\/3410992.3410994","relation":{},"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"2020-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}