scispace - formally typeset
Book ChapterDOI

Ad hoc security associations for groups

TLDR
New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented and security properties and group management for these protocols are discussed.
Abstract
A security association specifies the cryptographic keys and algorithms to be used for secure communication among the participants in the association. Key agreement in ad hoc scenarios, that is, without key management infrastructure is a challenging task, in particular, if the security association should involve a group of entities. In this paper, existing pairwise ad hoc key agreement protocols are extended for groups of arbitrary number of entities. New protocols based on both passkeys and numeric comparison (short authenticated strings) are presented. Also security properties and group management for these protocols are discussed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

SPATE: small-group PKI-less authenticated trust establishment

TL;DR: The implementation of SPATE on Nokia N70 smartphones allows users to establish trust in small groups of up to eight users in less than one minute, and the example SPATE applications provide increased security with little overhead noticeable to users once keys are established.
Proceedings ArticleDOI

GAnGS: gather, authenticate 'n group securely

TL;DR: GAnGS, a protocol for the secure exchange of authenticated information among a group of people, is proposed and designed to be robust to user errors, such as miscounting the number of participants or incorrectly comparing checksums.
Journal ArticleDOI

A Survey of User Interaction for Spontaneous Device Association

TL;DR: A novel taxonomy is used to structure the survey with respect to the different conceptual models and types of user action employed for device association, and an in-depth survey of existing techniques discussing their individual characteristics, benefits, and issues is provided.
Journal ArticleDOI

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

TL;DR: In this article, an analytical survey of authentication protocols of this type is given, and a number of strategies used to build interactive pair-wise and group protocols that minimise the human work relative to the amount of security obtained as well as optimising the computation processing are discussed.
Posted Content

Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey.

TL;DR: In this article, an analytical survey of authentication protocols of this type is given, and a number of strategies used to build interactive pair-wise and group protocols that minimise the human work relative to the amount of security obtained as well as optimising the computation processing are discussed.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Proceedings ArticleDOI

Encrypted key exchange: password-based protocols secure against dictionary attacks

TL;DR: A combination of asymmetric (public-key) and symmetric (secret- key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced.
Book ChapterDOI

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks

TL;DR: A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel.
Proceedings ArticleDOI

Diffie-Hellman key distribution extended to group communication

TL;DR: This paper considers a class of protocols that are natural extensions of DiffieHellman to the n-party case and argues that these protocols are optimal with respect to certain aspects of protocol complexity.
Proceedings Article

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.

TL;DR: This paper presents a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives, over the wireless link.
Related Papers (5)