Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Replay Attack

Handbook of Research on Wireless Security
Replay attack is an attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.
Published in Chapter:
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
Sangheon Pack (Korea University, South Korea), Sungmin Baek (Seoul National University, South Korea), Taekyoung Kwon (Seoul National University, South Korea), and Yanghee Choi (Seoul National University, South Korea)
Copyright: © 2008 |Pages: 17
DOI: 10.4018/978-1-59904-899-4.ch025
Abstract
Network mobility (NEMO) enables seamless and ubiquitous Internet access while on-board vehicles. Even though the Internet Engineering Task Force (IETF) has standardized the NEMO basic support protocol as a network layer mobility solution, little studies have been conducted in the area of authentication, authorization, and accounting (AAA) framework that is a key technology for successful deployment. In this article, we first review the existing AAA protocols and analyze their suitability in NEMO environments. After that, we propose a localized AAA framework to retain the mobility transparency as the NEMO basic support protocol and to reduce the signaling cost incurred in the AAA procedures. The proposed AAA framework supports mutual authentication and prevents various threats such as replay attack, man-in-the-middle attack, and key exposure. Performance analysis on the AAA signaling cost is carried out. Numerical results demonstrate that the proposed AAA framework is efficient under different NEMO environments.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Robust User Authentication Scheme for IoT-Based Healthcare Applications
A replay attack is a network attack in which attacker records the messages and fraudulently repeats it as an authentic entity.
Full Text Chapter Download: US $37.50 Add to Cart
Security Aspects in Radio Frequency Identification Networks
In this threat a malicious attacker intercepts actual messages and later these will be sent for a legitimate entity in order to impersonate a given party.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR