메뉴 건너뛰기




Volumn 4657 LNCS, Issue , 2007, Pages 135-144

On device authentication in wireless networks: Present issues and future challenges

Author keywords

802.1X; Device authentication; TCG; Wireless security

Indexed keywords

AUTHENTICATION; PROBLEM SOLVING; SECURITY OF DATA;

EID: 37249003759     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74409-2_16     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 1
    • 37249056244 scopus 로고    scopus 로고
    • Härtung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of CS. Univ. of Colorado (January 2005)
    • Härtung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems, T.R. CU-CS-990-05, Department of CS. Univ. of Colorado (January 2005)
  • 2
    • 37249001562 scopus 로고    scopus 로고
    • 802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements
    • Part 11, IEEE Press, Los Alamitos June
    • IEEE Std. 802.11i-2004, Amendment to IEEE Std. 802.11, 1999 Edition, Amendment 6: Medium Access Control (MAC) Security Enhancements, Part 11, IEEE Press, Los Alamitos (June 2004)
    • (2004)
    • IEEE Std1
  • 3
    • 37249039753 scopus 로고    scopus 로고
    • IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)
    • IEEE 802.1X-2004 IEEE Standards for Local and metropolitan area networks - Port-Based Network Access Control (December 2004)
  • 4
    • 37249038315 scopus 로고    scopus 로고
    • IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)
    • IEEE P802.16e/Draft12, IEEE Standard for Local and metropolitan area networks, Amendment for Physical and Medium Access Control Layers (published October 2005)
  • 5
    • 37249069196 scopus 로고    scopus 로고
    • TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 February 2005
    • TCG, TPM Main Part 1 Design Principles Spec. Version 1.2 Revision 85 (February 2005)
  • 6
    • 37249075170 scopus 로고    scopus 로고
    • TCG Mobile Trusted Module Spec, version 0.9, Revision 1, DRAFT September 2006
    • TCG Mobile Trusted Module Spec, version 0.9, Revision 1, DRAFT (September 2006)
  • 7
    • 37249089187 scopus 로고    scopus 로고
    • TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)
    • TCG, Spec. Architecture Overview, Specification Revision 1.2 (April 2004)
  • 8
    • 33746633133 scopus 로고    scopus 로고
    • Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification
    • June
    • Bruschi, D., Cavallaro, L., Lanzi, A., Monga, M.: Attacking a Trusted Computing Platform, Improving the Security of the TCG Specification, Tech. Report RT (June 2005)
    • (2005) Tech. Report RT
    • Bruschi, D.1    Cavallaro, L.2    Lanzi, A.3    Monga, M.4
  • 9
    • 77951490285 scopus 로고    scopus 로고
    • Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base
    • ACM, New York
    • Hendricks, J., van Doom, L.: Secure Bootstrap is Not Enough: Shoring up the Trusted Computing Base. In: Proc. of the 11th ACM SIGOPS, September 2004, ACM, New York (2004)
    • (2004) Proc. of the 11th ACM SIGOPS, September
    • Hendricks, J.1    van Doom, L.2
  • 10
    • 37249080941 scopus 로고    scopus 로고
    • Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST
    • July
    • Jansen, W., Gavrila, S., Séveillac, C., Korolev, V.: Smart Cards and Mobile Device Authentication: An Overview and Implementation, NIST, NISTIR 7206 (July 2005)
    • (2005) NISTIR , vol.7206
    • Jansen, W.1    Gavrila, S.2    Séveillac, C.3    Korolev, V.4
  • 11
    • 1542317849 scopus 로고    scopus 로고
    • Secure Verification of Location Claims
    • September 19, California, USA, pp
    • Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: ACM WiSE'03, September 19, 2003, California, USA, pp. 1-10 (2003)
    • (2003) ACM WiSE'03 , pp. 1-10
    • Sastry, N.1    Shankar, U.2    Wagner, D.3
  • 12
    • 33745164883 scopus 로고    scopus 로고
    • Trusted Computing-Based Security Architecture For 4G Mobile Networks
    • Zheng, Y., He, D., Yu, W., Tang, X.: Trusted Computing-Based Security Architecture For 4G Mobile Networks. In: Proc. of PDCAT '05, pp. 251-255 (2005)
    • (2005) Proc. of PDCAT '05 , pp. 251-255
    • Zheng, Y.1    He, D.2    Yu, W.3    Tang, X.4
  • 14
    • 2942625823 scopus 로고    scopus 로고
    • Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149-153, 04
    • Henrici, D., Muller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Ident. In: IEEE PerCom, pp. 149-153, 04
  • 15
    • 77958548111 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Juels, A., Weis, A.: Authenticating Pervasive Devices with Human Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 149-153. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 149-153
    • Juels, A.1    Weis, A.2
  • 16
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices
    • Christianson, B, Lomas, M, eds, Security Protocols, Springer, Heidelberg
    • Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols. LNCS, vol. 1361, pp. 125-136. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 17
    • 33644748254 scopus 로고    scopus 로고
    • Provably secure authenticated key exchange protocols for low power computing clients
    • Wen, H.-A., et al.: Provably secure authenticated key exchange protocols for low power computing clients. Computers & Security 25, 106-113 (2006)
    • (2006) Computers & Security , vol.25 , pp. 106-113
    • Wen, H.-A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.