Integrity regions: authentication through presence in wireless networks

  • Authors:
  • Srdjan Čapkun;Mario Čagalj

  • Affiliations:
  • ETH Zurich, Zurich, Switzerland;University of Split, Split, Croatia

  • Venue:
  • WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. Integrity regions are based on the verification of entity proximity through time-of-arrival ranging techniques. We demonstrate how I-regions can be efficiently implemented with ultrasonic ranging, in spite of the fact that ultrasound ranging techniques are vulnerable to distance enlargement and reduction attacks. We further discuss how I-regions can be used in key establishment applications in peer-to-peer wireless networks.