Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Relay attack defense method and system based on pulse flight time ranging

A time-of-flight and pulse technology, which is applied in the field of relay attack defense based on pulse time-of-flight ranging, can solve the problems of large signal transmission and reception delay, incompatibility, and poor ranging accuracy, so as to reduce signal transmission and reception delay and reduce relay. The effect of attack, high ranging accuracy

Active Publication Date: 2019-04-19
TSINGHUA UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional wireless communication technologies such as Wifi, Bluetooth, and Zigbee (Zigbee protocol) are generally based on signal strength ranging, and the ranging accuracy is poor, and they are vulnerable to interference and attacks. Wireless transmission scheme for physical layer defense against relay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Relay attack defense method and system based on pulse flight time ranging
  • Relay attack defense method and system based on pulse flight time ranging
  • Relay attack defense method and system based on pulse flight time ranging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0030] Firstly, the key points of the physical layer defense method based on challenge-response verification, and the problems existing in the circuit system used in the method in related technologies are described in detail.

[0031] Such as figure 1 As shown, the verification node (V) sends a challenge bit C to the proof node (P) i modulated signal; after the proof node receives the signal, at time t p Demodulate and calculate the response bit R i =f(C i ), and send a response bit R to the verification node i modulated sign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a relay attack defense method and system based on pulse flight time ranging, wherein the method includes the steps of synchronizing a verification node and a certification nodein advance; allowing the verification node to emit a pulse with a challenge bit Ci subjected to pulse position modulation; allowing the verification node to receive a first pulse, detecting an envelope rising edge of the first pulse, and demodulating to obtain data Ci; allowing the certification node to calculate a response bit Ri based on the challenge bit Ci; allowing the certification node todelay based on the envelope rising edge of the first pulse to obtain an emitted pulse trigger signal, and transmitting a pulse with the response bit Ri subjected to pulse position modulation; allowingthe verification node to receive a second pulse, detecting an envelope rising edge of the second pulse, demodulating to obtain data Ri, and measuring signal flight time; allowing the verification node to verify the position of the certification node and correctness of the response bit Ri. The method herein helps reduce signal transceiving delay of the certification node, provides high ranging precision, and helps effectively decrease the relay attack chances.

Description

technical field [0001] The invention relates to the technical field of pulse demodulation and secure communication, in particular to a relay attack defense method and system based on pulse time-of-flight ranging. Background technique [0002] With the rapid development of wireless technology, wireless security authentication has been widely used in daily life, including car intelligent keyless entry system, intelligent access control system, contactless bank card payment system and ad hoc network interconnection, etc. The terminal (verification node) communicates wirelessly with the user (certification node) and verifies its identity. After the verification is successful, the user can obtain the use or access permission of the terminal. [0003] A major security problem in wireless security authentication is called relay attack (Relay Attack). A relay attack refers to one or more attackers forwarding information between a validator node and a proof node that are far apart, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G01S13/26H04W12/06H04W56/00H04W12/122
CPCH04W12/06H04W56/00G01S13/26
Inventor 李宇根宋海昕王志华
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products