Relay attack defense method and system based on pulse time-of-flight ranging

A time-of-flight and pulse technology, which is applied in the field of relay attack defense based on pulse time-of-flight ranging, can solve the problems of large signal transmission and reception delay, inappropriateness, and poor ranging accuracy, so as to reduce signal transmission and reception delays and reduce relay Attack, the effect of high ranging accuracy

Active Publication Date: 2021-05-28
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional wireless communication technologies such as Wifi, Bluetooth, and Zigbee (Zigbee protocol) are generally based on signal strength ranging, and the ranging accuracy is poor, and they are vulnerable to interference and attacks. Wireless transmission scheme for physical layer defense against relay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay attack defense method and system based on pulse time-of-flight ranging
  • Relay attack defense method and system based on pulse time-of-flight ranging
  • Relay attack defense method and system based on pulse time-of-flight ranging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0030] Firstly, the key points of the physical layer defense method based on challenge-response verification, and the problems existing in the circuit system used in the method in related technologies are described in detail.

[0031] Such as figure 1 As shown, the verification node (V) sends a challenge bit C to the proof node (P) i modulated signal; after the proof node receives the signal, at time t p Demodulate and calculate the response bit R i =f(C i ), and send a response bit R to the verification node i modulated sign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a relay attack defense method and system based on pulse time-of-flight ranging, wherein the method includes the following steps: synchronizing the verification node and the verification node in advance; the verification node transmits the challenge bit C i The pulse modulated by the pulse position; the proof node receives the first pulse, detects the rising edge of the first pulse envelope, and demodulates to obtain the data C i ; The proof node is based on the challenge bit C i Calculate the response bit R i ;Prove that the node obtains the transmit pulse trigger signal based on the delay of the rising edge of the first pulse envelope, and transmits the response bit R i The pulse modulated by the pulse position; the verification node receives the second pulse, detects the rising edge of the second pulse envelope, and demodulates to obtain the data R i , and measure the signal flight time; the verification node verifies the position of the proof node and responds with bit R i correctness. This method can reduce the signal sending and receiving delay of the proof node, and at the same time achieve high ranging accuracy, effectively reducing the possibility of relay attacks.

Description

technical field [0001] The invention relates to the technical field of pulse demodulation and secure communication, in particular to a relay attack defense method and system based on pulse time-of-flight ranging. Background technique [0002] With the rapid development of wireless technology, wireless security authentication has been widely used in daily life, including car intelligent keyless entry system, intelligent access control system, contactless bank card payment system and ad hoc network interconnection, etc. The terminal (verification node) communicates wirelessly with the user (certification node) and verifies its identity. After the verification is successful, the user can obtain the use or access permission of the terminal. [0003] A major security problem in wireless security authentication is called relay attack (Relay Attack). A relay attack refers to one or more attackers forwarding information between a validator node and a proof node that are far apart, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G01S13/26H04W12/122H04W56/00
CPCH04W12/06H04W56/00G01S13/26
Inventor 李宇根宋海昕王志华
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products