Method and apparatus for privacy protection in ad hoc networks
A technology of equipment and characteristics, used in safety devices, electrical components, transmission systems, etc., can solve problems such as limiting the effective time of query
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] Embodiments of the present invention, however, recognize that replayed queries outside of the network that originated the query are more difficult to defend against. If the group member is not within the local network from which the query was initiated, it will not recognize that the query has already been asked, and will therefore interpret the query as a new query. For example, if messages are exchanged between members of a political or support group organized into an ad hoc network, an attacker may log queries sent by members of the group. The attacker can then replay the query at corporate headquarters (eg, while relaying the query for rebroadcasting). Devices that responded to the rebroadcast query likely belonged to individuals who were members of the group, but who were not present at the meeting.
[0014] Embodiments of the present invention further recognize that knowledge of where a query is originated can prevent replay attacks in which a query recorded in o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


