Research Article

A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme

Table 1

Benchmark with existing schemes.

SchemeParameters
Processing DelayPrecise Distance MeasurementSpectrum ConsumptionClockingEP/LCTerroristHijacking

Brands & Chaum [8]>50 nsNoNoNoYesYes
CRCS [11]1nsNoYesYesYesYes
UWB-based [15, 22]2.5 nsYes (-level)High ( of )YesNoYesYes
FMCW-based [14]Yes (-level)High ( of )YesYesYesYes
SFCW-based (this scheme)Yes (-level)Low (discrete frequencies)YesYesYesYes

The authors discuss the protocol security against various attacks in Section 6 but only list four types of attacks (Clocking, Early Detect, Late Commit, and Distance Hijacking attacks) due to space limitations of the page. Actually, all the five types of schemes listed in Table 1 can resist the attacks not listed in the table.