A Countermeasure to Defend Against Relay Attacks in Wireless Networks

被引:0
|
作者
Tang, Caimu [1 ]
Wu, Dapeng Oliver [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a non-interactive zero-knowledge proof scheme is proposed for secure identification in wireless networks, and it uses a timed oblivious transfer technique to enable a single verifier to identify multiple provers. The verifier and the prover do not need to be synchronized in this scheme. This scheme also enjoys the distance bounding property which makes the proposed scheme invulnerable to the relay attack. We propose to use the order statistic for the detection of relay attackers. We show that it is optimal in terms of minimum variance. Finally, we will shed some light on implementation issues of our proposed scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Defend against cache consistency attacks in wireless ad hoc networks
    Zhang, WS
    Cao, GH
    PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 22 - 32
  • [2] Using Channel Diversity to Defend Against Wormhole Attacks in Wireless Sensor Networks
    Zaidi, Syed Muhammad Asad
    Baig, Waleed Akram
    Kim, Ki-Hyung
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 2031 - 2042
  • [3] Defend against topological attacks in sensor networks
    Zhou, Yun
    Fang, Yuguang
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 768 - 773
  • [4] On Localized Countermeasure Against Reactive Jamming Attacks in Smart Grid Wireless Mesh Networks
    Shin, Incheol
    Cho, Minkyoung
    APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [5] Mobile Sink Using Multiple Channels to Defend Against Wormhole Attacks in Wireless Sensor Networks
    Rasheed, Amar
    Mahapatra, Rabi
    2009 IEEE 28TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCC 2009), 2009, : 216 - 222
  • [6] Distance-bounding based defense against relay attacks in wireless networks
    Tang, Caimu
    Wu, Dapeng Oliver
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4071 - 4078
  • [7] Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
    Khalil, Issa
    Bagchi, Saurabh
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) : 1096 - 1112
  • [8] SybilDefender: Defend Against Sybil Attacks in Large Social Networks
    Wei, Wei
    Xu, Fengyuan
    Tan, Chiu C.
    Li, Qun
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 1951 - 1959
  • [9] HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
    Sejaphala, Lanka
    Velempini, Mthulisi
    Dlamini, Sabelo Velemseni
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD), 2018,
  • [10] Ambient Backscatter: A Novel Method to Defend Jamming Attacks for Wireless Networks
    Van Huynh, Nguyen
    Nguyen, Diep N.
    Thai Hoang, Dinh
    Dutkiewicz, Eryk
    Mueck, Markus
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (02) : 175 - 178