We propose a work-in-progress protocol to detect man-in-the-middle attacks during the communication between two parties, by leveraging the existence of disjoint paths between the communicating parties. Our protocol allows us to detect attackers either at the protocol level (through delay measurements) or at the user level (if the attackers tamper with the data).
展开▼