메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 250-271

Authenticating ad hoc networks by comparison of short digests

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; CHANNEL CAPACITY; CRYPTOGRAPHY; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 40149095729     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.07.010     Document Type: Article
Times cited : (28)

References (40)
  • 1
    • 40149094423 scopus 로고    scopus 로고
    • See: http://en.wikipedia.org/wiki/Avalanche_effect.
    • See: http://en.wikipedia.org/wiki/Avalanche_effect.
  • 2
    • 40149084433 scopus 로고    scopus 로고
    • D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers: authentication in ad hoc wireless networks, in: Symposium on Network and Distributed Systems Security, San Diego, California, USA, 2002.
    • D. Balfanz, D. Smetters, P. Stewart, H. Wong, Talking to strangers: authentication in ad hoc wireless networks, in: Symposium on Network and Distributed Systems Security, San Diego, California, USA, 2002.
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology-Crypto 1993, Springer-Verlag
    • Bellare M., and Rogaway P. Entity authentication and key distribution. Advances in Cryptology-Crypto 1993. LNCS vol. 773 (1993), Springer-Verlag 232-249
    • (1993) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0031642585 scopus 로고    scopus 로고
    • M. Bellare, R. Canetti, H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, in: 30th STOC, 1998.
    • M. Bellare, R. Canetti, H. Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols, in: 30th STOC, 1998.
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology-Eurocrypt 2000, Springer-Verlag
    • Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology-Eurocrypt 2000. LNCS vol. 1807 (2000), Springer-Verlag 139-155
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 40149089357 scopus 로고    scopus 로고
    • See: www.bluetooth.com/developer/specification/specification.asp.
    • See: www.bluetooth.com/developer/specification/specification.asp.
  • 7
    • 40149084127 scopus 로고    scopus 로고
    • Simple Pairing White Paper. See: www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf.
    • Simple Pairing White Paper. See: www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F70F/0/SimplePairing_WP_V10r00.pdf.
  • 8
    • 31344438973 scopus 로고    scopus 로고
    • M. over(C, ̌)agalj, S. over(C, ̌)apkun, J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE, Special Issue on Security and Cryptography, vol. 94, no. 2, February 2006.
    • M. over(C, ̌)agalj, S. over(C, ̌)apkun, J. Hubaux, Key agreement in peer-to-peer wireless networks, in: Proceedings of the IEEE, Special Issue on Security and Cryptography, vol. 94, no. 2, February 2006.
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis for key-exchange protocols and their use for building secure channels
    • Advances in Cryptology-Eurocrypt 2001, Springer-Verlag
    • Canetti R., and Krawczyk H. Analysis for key-exchange protocols and their use for building secure channels. Advances in Cryptology-Eurocrypt 2001. LNCS vol. 2045 (2001), Springer-Verlag 453-474
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 24944566824 scopus 로고    scopus 로고
    • Universally composable password-based key exchange
    • Advances in Cryptology-Eurocrypt 2005, Springer-Verlag
    • Canetti R., Halevi S., Katz J., Lindell Y., and MacKenzie P. Universally composable password-based key exchange. Advances in Cryptology-Eurocrypt 2005. LNCS vol. 3494 (2005), Springer-Verlag 404-421
    • (2005) LNCS , vol.3494 , pp. 404-421
    • Canetti, R.1    Halevi, S.2    Katz, J.3    Lindell, Y.4    MacKenzie, P.5
  • 12
    • 24644483295 scopus 로고    scopus 로고
    • Exploiting empirical engagement in authentication protocol design
    • Proceedings of 2nd International Conference on Security in Pervasive Computing (SPC ′05). Hutter D., and Ullmann M. (Eds), Springer, Boppard, Germany
    • Creese S.J., Goldsmith M.H., Harrison R., Roscoe A.W., Whittaker P., and Zakiuddin I. Exploiting empirical engagement in authentication protocol design. In: Hutter D., and Ullmann M. (Eds). Proceedings of 2nd International Conference on Security in Pervasive Computing (SPC ′05). LNSC vol. 3450 (2005), Springer, Boppard, Germany
    • (2005) LNSC , vol.3450
    • Creese, S.J.1    Goldsmith, M.H.2    Harrison, R.3    Roscoe, A.W.4    Whittaker, P.5    Zakiuddin, I.6
  • 13
    • 33751023842 scopus 로고    scopus 로고
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of IEEE Security Track, 2006.
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, M. Xiao, Bootstrapping multi-party ad-hoc security, in: Proceedings of IEEE Security Track, 2006.
  • 14
    • 40149108852 scopus 로고    scopus 로고
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, The attacker in ubiquitous computing environments: formalising the threat model, in: T. Dimitrakos, F. Martinelli (Eds.), Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003, IIT-CNR Technical Report.
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, The attacker in ubiquitous computing environments: formalising the threat model, in: T. Dimitrakos, F. Martinelli (Eds.), Workshop on Formal Aspects in Security and Trust, Pisa, Italy, September 2003, IIT-CNR Technical Report.
  • 15
    • 40149109275 scopus 로고    scopus 로고
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, Security properties and mechanisms in human-centric computing, in: P. Robinson, H, Vogt, W. Wagealla (Eds.), Privacy, Security and Trust within the Context of Pervasive Computing, Kluwer International Series in Engineering and Computer Science, Springer, 2004. Proceedings of Workshop on Security and Privacy in Pervasive Computing, Wien, April 2004.
    • S.J. Creese, M.H. Goldsmith, A.W. Roscoe, I. Zakiuddin, Security properties and mechanisms in human-centric computing, in: P. Robinson, H, Vogt, W. Wagealla (Eds.), Privacy, Security and Trust within the Context of Pervasive Computing, Kluwer International Series in Engineering and Computer Science, Springer, 2004. Proceedings of Workshop on Security and Privacy in Pervasive Computing, Wien, April 2004.
  • 16
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann C., Mitchell C., and Nyberg K. Manual authentication for wireless devices. RSA Cryptobytes 7 1 (2004) 29-37
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 17
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • Mitchell C.J. (Ed), IEE, London
    • Gehrmann C., and Nyberg K. Security in personal area networks. In: Mitchell C.J. (Ed). Security for Mobility (2004), IEE, London 191-230
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 18
    • 0024868772 scopus 로고    scopus 로고
    • O. Goldreich, L.A. Levin, A hard-core predicate for all one-way functions, in: Annual ACM Symposium on Theory of Computing, 1989, pp. 25-32.
    • O. Goldreich, L.A. Levin, A hard-core predicate for all one-way functions, in: Annual ACM Symposium on Theory of Computing, 1989, pp. 25-32.
  • 21
    • 24644472550 scopus 로고    scopus 로고
    • Ephemeral pairing on anonymous networks
    • 2nd International Conference on Security in Pervasive Computing (SPC ′05). Hutter D., and Ullmann M. (Eds), Springer, Boppard, Germany
    • Hoepman J.-H. Ephemeral pairing on anonymous networks. In: Hutter D., and Ullmann M. (Eds). 2nd International Conference on Security in Pervasive Computing (SPC ′05). LNSC vol. 3450 (2005), Springer, Boppard, Germany 101-116
    • (2005) LNSC , vol.3450 , pp. 101-116
    • Hoepman, J.-H.1
  • 22
    • 34247333484 scopus 로고    scopus 로고
    • Ephemeral pairing problem
    • 8th International Conference Fin. Crypt., Springer
    • Hoepman J.-H. Ephemeral pairing problem. 8th International Conference Fin. Crypt. LNCS vol. 3110 (2004), Springer 212-226
    • (2004) LNCS , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 23
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in bluetooth
    • CT-RSA 2001, Springer-Verlag
    • Jakobsson M., and Wetzel S. Security weaknesses in bluetooth. CT-RSA 2001. LNCS vol. 2020 (2001), Springer-Verlag 176-191
    • (2001) LNCS , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 24
    • 84991939136 scopus 로고    scopus 로고
    • H. Krawczyk, LFSR-based hashing and authentication, in: CRYPTO 1994, LNCS, vol. 839, 1994, pp. 129-139.
    • H. Krawczyk, LFSR-based hashing and authentication, in: CRYPTO 1994, LNCS, vol. 839, 1994, pp. 129-139.
  • 25
    • 84957367286 scopus 로고    scopus 로고
    • H. Krawczyk, New hash functions for message authentication, in: EUROCRYPT 1995, LNCS, vol. 921, 1995, pp. 301-310.
    • H. Krawczyk, New hash functions for message authentication, in: EUROCRYPT 1995, LNCS, vol. 921, 1995, pp. 301-310.
  • 26
    • 40149088897 scopus 로고    scopus 로고
    • D. Knuth, The art of computer programming, Seminumerical Algorithms, third ed., vol. 2, Addison-Wesley, Reading, MA, 1997, ISBN: 0-201-89684-2.
    • D. Knuth, The art of computer programming, Seminumerical Algorithms, third ed., vol. 2, Addison-Wesley, Reading, MA, 1997, ISBN: 0-201-89684-2.
  • 27
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Tools and Algorithms for the Construction and Analysis of Systems, Springer-Verlag
    • Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for the Construction and Analysis of Systems. LNCS vol. 1055 (1996), Springer-Verlag 147-166
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 28
    • 40149087966 scopus 로고    scopus 로고
    • Princeton University Press
    • Luby M. Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes (1996), Princeton University Press
    • (1996) Princeton Computer Science Notes
    • Luby, M.1
  • 29
    • 0025106672 scopus 로고    scopus 로고
    • Y. Mansour, N. Nisan, P. Tiwari, The computational complexity of universal hashing, in: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 1990, pp. 235-243.
    • Y. Mansour, N. Nisan, P. Tiwari, The computational complexity of universal hashing, in: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 1990, pp. 235-243.
  • 30
    • 40149106888 scopus 로고    scopus 로고
    • L.H. Nguyen, A.W. Roscoe, Efficient group authentication protocol based on human interaction, in: Proceedings of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, August 2006, pp. 9-31.
    • L.H. Nguyen, A.W. Roscoe, Efficient group authentication protocol based on human interaction, in: Proceedings of Workshop on Foundation of Computer Security and Automated Reasoning Protocol Security Analysis, August 2006, pp. 9-31.
  • 31
    • 33745832230 scopus 로고    scopus 로고
    • SAS-based authenticated key agreement
    • Public Key Cryptography-PKC'06: The 9th International Workshop on Theory and Practice in Public Key Cryptography, Springer
    • Pasini S., and Vaudenay S. SAS-based authenticated key agreement. Public Key Cryptography-PKC'06: The 9th International Workshop on Theory and Practice in Public Key Cryptography. LNCS vol. 3958 (2006), Springer 395-409
    • (2006) LNCS , vol.3958 , pp. 395-409
    • Pasini, S.1    Vaudenay, S.2
  • 32
    • 33745637238 scopus 로고    scopus 로고
    • An optimal non-interactive message authentication protocol
    • Topics in Cryptology-CT-RSA'06: The Cryptographers' Track at the RSA Conference 2006, Springer
    • Pasini S., and Vaudenay S. An optimal non-interactive message authentication protocol. Topics in Cryptology-CT-RSA'06: The Cryptographers' Track at the RSA Conference 2006. LNCS vol. 3860 (2006), Springer 280-294
    • (2006) LNCS , vol.3860 , pp. 280-294
    • Pasini, S.1    Vaudenay, S.2
  • 33
    • 33745121720 scopus 로고    scopus 로고
    • T. Peyrin, S. Vaudenay, The pairing problem with user interaction, in: SEC 2005, 2005, pp. 251-266.
    • T. Peyrin, S. Vaudenay, The pairing problem with user interaction, in: SEC 2005, 2005, pp. 251-266.
  • 34
    • 40149096777 scopus 로고    scopus 로고
    • A.W. Roscoe, Human-centred Computer Security. See: http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/113.pdf, 2005.
    • A.W. Roscoe, Human-centred Computer Security. See: http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/113.pdf, 2005.
  • 35
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: security issues for ad-hoc wireless networks
    • Security Protocols 1999, Springer-Verlag
    • Stajano F., and Anderson R. The resurrecting duckling: security issues for ad-hoc wireless networks. Security Protocols 1999. LNCS vol. 1976 (1999), Springer-Verlag 172-194
    • (1999) LNCS , vol.1976 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 36
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Advances in Cryptology-Crypto 1991, Springer-Verlag
    • Stinson D.R. Universal hashing and authentication codes. Advances in Cryptology-Crypto 1991. LNCS vol. 576 (1992), Springer-Verlag 74-85
    • (1992) LNCS , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 37
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Advances in Cryptology-Crypto 2005, Springer-Verlag
    • Vaudenay S. Secure communications over insecure channels based on short authenticated strings. Advances in Cryptology-Crypto 2005. LNCS vol. 3621 (2005), Springer-Verlag 309-326
    • (2005) LNCS , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 38
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman M.N., and Carter J.L. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22 (1981) 265-279
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2
  • 39
    • 85020573990 scopus 로고
    • On the design of S-boxes
    • CRYPTO 1985, Springer Verlag
    • Webster A.F., and Tavares S.E. On the design of S-boxes. CRYPTO 1985. LNCS vol. 218 (1986), Springer Verlag 523-534
    • (1986) LNCS , vol.218 , pp. 523-534
    • Webster, A.F.1    Tavares, S.E.2
  • 40
    • 40149093202 scopus 로고    scopus 로고
    • F.-L. Wong, F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, LNCS, Cambridge, England, 2005.
    • F.-L. Wong, F. Stajano, Multi-channel protocols, in: Proceedings of the 13th International Workshop on Security Protocols, LNCS, Cambridge, England, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.