A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
New Horizons for Mobile Computing
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes
Proceedings of the 5th international conference on Embedded networked sensor systems
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
SAKE: Software Attestation for Key Establishment in Sensor Networks
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Information Systems Frontiers
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Dialog codes for secure wireless communications
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Measurable security through isotropic channels
Proceedings of the 15th international conference on Security protocols
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
Proceedings of the 27th Annual Computer Security Applications Conference
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Silent cascade: enhancing location privacy without communication QoS degradation
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
SAPHE: simple accelerometer based wireless pairing with heuristic trees
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
SafeSlinger: easy-to-use and secure public-key exchange
Proceedings of the 19th annual international conference on Mobile computing & networking
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Hi-index | 0.00 |
This paper presents a new pairing protocol that allows twoCPU-constrained wireless devices Alice and Bob to establish ashared secret at a very low cost. To our knowledge, this is thefirst software pairing scheme that does not rely on expensivepublic-key cryptography, out-of-band channels (such as a keyboardor a display) or specific hardware, making it inexpensive andsuitable for CPU-constrained devices such as sensors.In the described protocol, Alice can send the secret bit 1 toBob by broadcasting an (empty) packet with the source field set toAlice. Similarly, Alice can send the secret bit 0 to Bob bybroadcasting an (empty) packet with the source field set to Bob.Only Bob can identify the real source of the packet (since it didnot send it, the source is Alice), and can recover the secret bit(1 if the source is set to Alice or 0 otherwise). An eavesdroppercannot retrieve the secret bit since it cannot figure out whetherthe packet was actually sent by Alice or Bob. By randomlygenerating n such packets Alice and Bob can agree on ann-bit secret key.Our scheme requires that the devices being paired, Alice andBob, are shaken during the key exchange protocol. This is toguarantee that an eavesdropper cannot identify the packets sent byAlice from those sent by Bob using data from the RSSI (ReceivedSignal Strength Indicator) registers available in commercialwireless cards. The proposed protocol works with off-the-shelf802.11 wireless cards and is secure against eavesdropping attacksthat use power analysis. It requires, however, some firmwarechanges to protect against attacks that attempt to identify thesource of packets from their transmission frequency.