Group-based multicast and dynamic membership in wireless networks with incomplete spatial coverage
Mobile Networks and Applications - Special issue on protocols and software paradigms of mobile networks
Satchel: providing access to any document, any time, anywhere
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction with mobile systems
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Information and Computation
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Analysis of security protocols as open systems
Theoretical Computer Science
Analysing a Stream Authentication Protocol Using Model Checking
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Automated Analysis of Some Security Mechanisms of SCEP
ISC '02 Proceedings of the 5th International Conference on Information Security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Group Multicast in Distributed Mobile Systems with Unreliable Wireless Network
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
A simple language for real-time cryptographic protocol analysis
ESOP'03 Proceedings of the 12th European conference on Programming
Hi-index | 0.00 |
We consider a known protocol for reliable multicast in distributed mobile systems where mobile hosts communicate with a wired infrastructure by means of wireless technology. The original specification of the protocol does not take into consideration any notion of computer security: an adversary may eavesdrop on communications between hosts and inject packets over the wireless links. We suggest a secured version of the protocol providing authenticity and integrity of packets over the wireless links. The secure mechanisms introduced rely on two different techniques: secure wireless channels and 1-time signature schemes. Further, we outline the formal verification of part of the secured protocol.