Explore the words cloud of the CSP project. It provides you a very rough idea of what is the project "CSP" about.
The following table provides information about the project.
EIDGENOESSISCHE TECHNISCHE HOCHSCHULE ZUERICH
|Coordinator Country||Switzerland [CH]|
|Total cost||1˙952˙274 €|
|EC max contribution||1˙952˙274 € (100%)|
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
|Duration (year-month-day)||from 2017-03-01 to 2022-02-28|
Take a look of project's partnership.
|1||EIDGENOESSISCHE TECHNISCHE HOCHSCHULE ZUERICH||CH (ZUERICH)||coordinator||1˙952˙274.00|
With the development of new location-based services and the expected deployment of cyber-physical systems (e.g., autonomous cars and drones) the reliance on location and time information in critical applications will only increase. Today's positioning systems are vulnerable to location spoofing by which devices can cheat on their own positions or can manipulate the measured positions of other devices. This problem cannot be fixed by a simple upgrade - existing positioning systems rely on legacy distance measurement techniques and protocols that were designed without security considerations or with security as an after-thought. We therefore need a new approach to the design of positioning systems that takes security requirements into account from the very start, and also accounts for the way that positioning systems are built and used. This is a cross-layer endeavor. In this project we will address the following fundamental questions: (1) Physical Layer. How can we design the right distance measurement (i.e., distance bounding) techniques that provide resilience to physical-layer and logical-layer attacks but retain the performance (range, accuracy and speed of execution) of equivalent non-secure systems? We will extend the existing knowledge in terms of the attacker models as well as achievable limits of security and performance of distance measurement techniques under realistic attacker models. (2) Link Layer. What are the right Medium Access Control (MAC) protocols for secure positioning, what are their performance and scalability limits? (3) Systems. How can distance bounding be integrated in mobile platforms, especially with trusted execution environments. How can this integration strengthen the security of distance bounding and support its use in a wide range of applications?
|year||authors and title||journal||last update|
Mridula Singh, Patrick Leu, Srjan Capkun
UWB with Pulse Reordering:Securing Ranging against Relay and Physical-Layer Attacks
published pages: , ISSN: , DOI:
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CSP" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (firstname.lastname@example.org) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "CSP" are provided by the European Opendata Portal: CORDIS opendata.