A Countermeasure to Defend Against Relay Attacks in Wireless Networks

被引:0
|
作者
Tang, Caimu [1 ]
Wu, Dapeng Oliver [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a non-interactive zero-knowledge proof scheme is proposed for secure identification in wireless networks, and it uses a timed oblivious transfer technique to enable a single verifier to identify multiple provers. The verifier and the prover do not need to be synchronized in this scheme. This scheme also enjoys the distance bounding property which makes the proposed scheme invulnerable to the relay attack. We propose to use the order statistic for the detection of relay attackers. We show that it is optimal in terms of minimum variance. Finally, we will shed some light on implementation issues of our proposed scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [11] A countermeasure against DDOS attacks using active networks technologies
    Kashiwa, D
    Chen, EY
    Fuji, H
    ANNALS OF TELECOMMUNICATIONS, 2003, 58 (3-4) : 605 - 629
  • [12] Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed
    Zhou, Jie
    Cao, Jiannong
    Zhang, Jun
    Zhang, Chisheng
    Yu, Yao
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 59 - 66
  • [13] TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks
    Singh, Rupinder
    Singh, Jatinder
    Singh, Ravinder
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (11): : 90 - 99
  • [14] A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information
    Jamshidi, Mojtaba
    Poor, Shokooh Sheikh Abooli
    Arghavani, Abbas
    Esnaashari, Mehdi
    Shaltooki, Abdusalam Abdulla
    Meybodi, Mohammad Reza
    AD HOC NETWORKS, 2020, 100
  • [15] A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems
    Ma, Di
    Saxena, Nitesh
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2684 - 2695
  • [16] Defend GPUs Against DoS Attacks
    Zhang, Wei
    2013 IEEE 32ND INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2013,
  • [17] Vendors defend against Panix attacks
    不详
    COMPUTER, 1996, 29 (11) : 18 - &
  • [18] A Randomized Countermeasure Against Parasitic Adversaries in Wireless Sensor Networks
    Papadimitratos, Panagiotis
    Luo, Jun
    Hubaux, Jean-Pierre
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (07) : 1036 - 1045
  • [19] Deep Learning Model to Defend against Covert Channel Attacks in the SDN Networks
    Kumar, M. Anand
    Pai, Aditya H.
    Agarwal, Jyoti
    Christa, Sharon
    Prasad, Guru M. S.
    Saifi, Sadik
    2023 ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES FOR HIGH PERFORMANCE APPLICATIONS, ACCTHPA, 2023,
  • [20] Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks
    Shanthamallu, Uday Shankar
    Thiagarajan, Jayaraman J.
    Spanias, Andreas
    THIRTY-FIFTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THIRTY-THIRD CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE AND THE ELEVENTH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2021, 35 : 9524 - 9532