SECURE GEOGRAPHIC BASED GAMING
First Claim
1. A method comprising:
- determining, by a device participating in a geogame, an amount of time that has passed since a previous network message was received by the device;
determining if the amount of time is equal to or greater than a threshold value of time; and
when it is determined that the amount of time is greater than a threshold value of time, determining that a network interdiction attack has occurred;
when it is determined that the amount of time is not greater than a threshold value of time, determining that a network interdiction attack has not occurred.
1 Assignment
0 Petitions
Accused Products
Abstract
Security in a geogame is maintained by implementing various security techniques. The various techniques provide specific advantages for different threat modes and attack styles against a geogame implemented via a mobile ad hoc network utilizing a geocast protocol. Jamming is detected by each player device listening for expected retransmissions of its own originated geocasts. If it fails to hear a retransmission, it concludes jamming. Network interdiction is detected by monitoring for received transmissions and/or periodically sending dummy transmissions to support other devices'"'"' detections. Location determination attacks are detected by recognizing “impossible” movements. Geogame interruption attacks are detected by detecting unauthorized requests to restart a geogame. Other security measures include utilizing cryptographic keys and/or pass phrases when geocasting. Various penalties within the context of a geogame are levied against a player if a security breach is detected.
96 Citations
20 Claims
-
1. A method comprising:
-
determining, by a device participating in a geogame, an amount of time that has passed since a previous network message was received by the device; determining if the amount of time is equal to or greater than a threshold value of time; and when it is determined that the amount of time is greater than a threshold value of time, determining that a network interdiction attack has occurred; when it is determined that the amount of time is not greater than a threshold value of time, determining that a network interdiction attack has not occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
geocasting a message by a device participating in a geogame; monitoring, by the device, for a retransmission of the geocast message; if a retransmission of the geocast message is not received within a threshold amount of time, determining that jamming has occurred; if a retransmission of the geocast message is received within a threshold amount of time, determining that jamming has not occurred
-
-
12. A mobile device comprising:
a processing portion configured to; determine an amount of time that has passed since a previous geocast packet was received by the device, wherein the device is participating in a geogame; determine if the amount of time is equal to or greater than a threshold value of time; and when it is determined that the amount of time is greater than a threshold value of time, determine that a network interdiction attack has not occurred; when it is determined that the amount of time is greater than a threshold value of time, determine that a network interdiction attack has occurred. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
Specification