Research Article
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme
Table 1
Benchmark with existing schemes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The authors discuss the protocol security against various attacks in Section 6 but only list four types of attacks (Clocking, Early Detect, Late Commit, and Distance Hijacking attacks) due to space limitations of the page. Actually, all the five types of schemes listed in Table 1 can resist the attacks not listed in the table. |