Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure Broadcast Communication in Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks
Embracing wireless interference: analog network coding
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Bootstrapping trust in a "trusted" platform
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Dialog codes for secure wireless communications
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
IEEE Transactions on Information Theory
The Wiretap Channel With Feedback: Encryption Over the Channel
IEEE Transactions on Information Theory
Using zero knowledge to share a little knowledge: bootstrapping trust in device networks
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Hi-index | 0.00 |
This article develops a shared-secret free wireless security infrastructure that provides confidentiality, identity authentication, message authentication, integrity, sender nonrepudiation, receiver nonrepudiation, and anonymity. Our infrastructure is based on two physical primitives, namely collaborative jamming and spatial signature enforcement, and a zero knowledge alternative for bootstrapping trust. Notably, it eschews the use of shared secrets, while providing a cryptosystem that is no less secure than conventional cryptosystems.