Two-Hop Distance-Bounding Protocols: Keep Your Friends Close - 2018


Authentication in wireless Communications usually depends on the physical proximity to a location. Distance-bounding (DB) protocols are cross-layer authentication protocols that are primarily based on the round-trip-time of challenge-response exchanges and will be employed to ensure physical proximity and combat relay attacks. However, traditional DB protocols depend on the assumption that the prover (e.g., user) is during the Communication range of the verifier (e.g., access purpose); one thing that may not be the case in multiple access control situations in ubiquitous computing environments furthermore after we would like to verify the proximity of our two-hop neighbour in an ad-hoc network. In this Project, we tend to extend ancient DB protocols to a two-hop setting, i.e., when the prover is out of the Communication range of the verifier and so, they each would like to depend on an untrusted in-between entity in order to verify proximity. We tend to gift a proper framework that captures the foremost representative classes of existing DB protocols and give a general technique to extend traditional DB protocols to the two-hop case (3 participants). We analyze the security of 2-hop DB protocols and establish connections with the protection issues of the corresponding one-hop case. Finally, we demonstrate the correctness of our security analysis and the potency of our model by remodeling five existing DB protocols to the 2-hop setting and we evaluate their performance with simulated experiments.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Energy-efficient link selection scheme in a two-hop relay scenario with considering a mobile relayABSTRACT:Recently researches show that important energy saving can be achieved by introducing mobile relays into
PROJECT TITLE :Achieving Maximum Degrees of Freedom of Two-Hop MIMO Alternate Half-Duplex Relaying System For Linear Transceivers: A Unified Transmission Framework for DF and AF ProtocolsABSTRACT:During this paper, a unique unified
PROJECT TITLE :Distributed Opportunistic Two-Hop Relaying With Backoff-Based Contention Among Spatially Random RelaysABSTRACT:Cooperative transmission can exploit the published nature of a wireless medium and leverage relay nodes
PROJECT TITLE : Security Analysis of Handover Key Management in 4G LTESAE Networks - 2014 ABSTRACT: The goal of 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) is to move mobile cellular wireless technology
PROJECT TITLE : Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks - 2014 ABSTRACT: Most of the nodes in ad hoc networks rely on batteries, which requires energy saving. Hence, numerous energy-efficient

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry