Table 1: TOA-based estimation summary.
Method Computational load Estimation accuracy Energy consumption
USR-LS low low low
CSR-LS medium medium low
Multiple-transmission high high high
Bar-Shalom, Y., Li, X. R., and Kirubarajan, T. (2004). Esti-
mation with applications to tracking and navigation:
theory algorithms and software. John Wiley & Sons.
Bar-Shalom, Y., Willett, P. K., and Tian, X. (2011). Track-
ing and data fusion. YBS publishing.
Beck, A., Stoica, P., and Li, J. (2008). Exact and approxi-
mate solutions of source localization problems. IEEE
Transactions on signal processing, 56(5):1770–1778.
Boureanu, I., Mitrokotsa, A., and Vaudenay, S. (2013). Se-
cure and lightweight distance-bounding. In Interna-
tional Workshop on Lightweight Cryptography for Se-
curity and Privacy, pages 97–113. Springer.
Brands, S. and Chaum, D. (1993). Distance-bounding pro-
tocols. In Workshop on the Theory and Applica-
tion of of Cryptographic Techniques, pages 344–359.
Springer.
Cheung, K. W., Ma, W.-K., and So, H.-C. (2004a). Ac-
curate approximation algorithm for toa-based max-
imum likelihood mobile location using semidefinite
programming. In 2004 IEEE International Confer-
ence on Acoustics, Speech, and Signal Processing,
volume 2, pages ii–145. IEEE.
Cheung, K. W. and So, H.-C. (2005). A multidimensional
scaling framework for mobile location using time-of-
arrival measurements. IEEE transactions on signal
processing, 53(2):460–470.
Cheung, K. W., So, H.-C., Ma, W.-K., and Chan, Y.-T.
(2004b). Least squares algorithms for time-of-arrival-
based mobile location. IEEE Transactions on Signal
Processing, 52(4):1121–1130.
Francillon, A., Danev, B., and Capkun, S. (2011). Re-
lay attacks on passive keyless entry and start systems
in modern cars. In Proceedings of the Network and
Distributed System Security Symposium (NDSS). Ei-
dgen
¨
ossische Technische Hochschule Z
¨
urich, Depart-
ment of Computer Science.
Gillette, M. D. and Silverman, H. F. (2008). A linear
closed-form algorithm for source localization from
time-differences of arrival. IEEE Signal Processing
Letters, 15:1–4.
Hancke, G. P. and Kuhn, M. G. (2005). An rfid distance
bounding protocol. In First International Conference
on Security and Privacy for Emerging Areas in Com-
munications Networks (SECURECOMM’05), pages
67–73. IEEE.
Ho, K. and Chan, Y. (1993). Solution and performance anal-
ysis of geolocation by TDOA. IEEE Transactions on
Aerospace and Electronic Systems, 29(4):1311–1322.
Kaune, R., H
¨
orst, J., and Koch, W. (2011). Accuracy anal-
ysis for TDOA localization in sensor networks. In In-
formation Fusion (FUSION), 2011 Proceedings of the
14th International Conference on, pages 1–8. IEEE.
Mitrokotsa, A., Peris-Lopez, P., Dimitrakakis, C., and Vau-
denay, S. (2013). On selecting the nonce length in
distance-bounding protocols. The Computer Journal,
56(10):1216–1227.
Mor
´
e, J. J. (1993). Generalizations of the trust region prob-
lem. Optimization methods and Software, 2(3-4):189–
209.
Patel, J., Das, M. L., and Nandi, S. (2018). On the security
of remote key less entry for vehicles. In 2018 IEEE
International Conference on Advanced Networks and
Telecommunications Systems (ANTS), pages 1–6.
Ranganathan, A. and Capkun, S. (2017). Are we really
close? verifying proximity in wireless systems. IEEE
Security & Privacy.
Rasmussen, K. B. and
ˇ
Capkun, S. (2008). Location privacy
of distance bounding protocols. In Proceedings of the
15th ACM conference on Computer and communica-
tions security, pages 149–160. ACM.
Smith, J. and Abel, J. (1987). Closed-form least-squares
source location estimation from range-difference mea-
surements. IEEE Transactions on Acoustics, Speech,
and Signal Processing, 35(12):1661–1669.
Stoica, P. and Li, J. (2006). Lecture notes-source localiza-
tion from range-difference measurements. IEEE Sig-
nal Processing Magazine, 23(6):63–66.
Xie, Y., Lee, J. H., and Song, T. L. (2018). Analysis for
reference sensor selection in time difference of arrival-
based localisation. Electronics Letters, 54(25):1454–
1456.
Time-based Countermeasures for Relay Attacks on PKES Systems
801