I am developing a mobile application that sends some encrypted data to the Bluetooth device , and this Bluetooth device sends data to the server. My question is that in this case I can prevent re-attacks. Someone might use a fake Bluetooth device to receive signals and send them to the server.
The mobile application works offline and does not have a connection to the server. Therefore, using a synchronized nonce or counter does not help.
I also can not use the timestamp to narrow the attack window, because the time of the mobile phone may be incorrect (synchronized with the time server).
The connection between my mobile application and the Bluetooth device is one-way, and my mobile application can only send data to the device.
- , . , , A, 123, - 156, , - [124, 1000123] (1000000 ).
, , , . MAC ( , ).
, , ( A , A), . , , , , .
Source: https://habr.com/ru/post/1535503/More articles:Adjacency-list scale chart in degrees - algorithmHow to get the address of the current machine? - goCan you recommend a package in R, which can be used to calculate accuracy, feedback and F1-assessment for classification problems of several classes - rDelete circles using opencv - pythonПерегрузка метода переменным аргументом - javastd :: isinf does not work with -ffast-math. how to check infinity - c ++How to use float effectively in equals ()? - javaсоздать экземпляр локального внутреннего класса - javaAn exception was selected when rendering the template. A form can only be submitted once. - formsdatagrid filter for relationship object as text field (insted dropdown) in sonata admin in symfony 2.4 - symfonyAll Articles