Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Context-Based Secure Resource Access in Pervasive Computing Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Context and Location-Aware Encryption for Pervasive Computing Environments
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
NFC Devices: Security and Privacy
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Security associations in personal networks: a comparative analysis
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Secure Communication Based on Ambient Audio
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
Online collaboration tools are a ubiquitous mediator of many human interactions. In the virtual world, they enable secure interaction by controlling access to shared resources. Yet relying on them to support face-to-face collaboration might be suboptimal as they require Internet connectivity. A more efficient way of co-located resource sharing is the use of local communications. Yet setting up the necessary security mechanisms can be cumbersome. In this article we present PIKE and its variant P2PIKE, key-exchange protocols that minimize this configuration effort. Both piggyback the exchange of keys on top of an existing service and exchange keys proactively-before the interaction takes place. In addition to an implementation, we outline two applications and present a thorough evaluation to show the benefits and limitations of our approach.