Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
Cryptographic key exchange based on locationing information
Pervasive and Mobile Computing
How to construct secure cryptographic location-based services
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
We define "Secure Space" as an enclosed area within which wireless devices can participate in secure group communication. A device is able to join a secure space group by the virtue of its location within the enclosure. The devices communicate with each other using IEEE 802.11 wireless LAN or other similar wireless access technologies. There are two important aspects of this problem --- (a) determining and authenticating the location of a wireless device at the granularity of a secure space, and (b) defining scalable mechanisms to (re)-distribute a common group key among the device inside the secure space, as new devices enter and existing devices leave the space. We solve the location determination and authentication problem using signal strength based techniques. Results from actual wireless experiments show the feasibility of this scheme. We leverage scalable solutions for secure group communication in other environments to propose a hybrid scheme for the key redistribution problem.