메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 87-100

Standards for security associations in personal networks: A comparative analysis

Author keywords

Attacks; Bluetooth; Comparative survey; HomePlugAV; Networks; Personal networks; Security; Security association; Standards; Wi Fi; WUSB

Indexed keywords

BLUETOOTH; NETWORKS (CIRCUITS); STANDARDS; SURVEYS; TAXONOMIES; WI-FI;

EID: 61849117271     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023428     Document Type: Article
Times cited : (26)

References (33)
  • 4
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • Bellovin, S.M. and Merritt, M. (1992) 'Encrypted key exchange: password-based protocols secure against dictionary attacks', Proceedings of the 1992 IEEE Symposium on Security and Privacy, pp.72-84, ieeexplore.ieee.org/iel2/412/5566/00213269.pdf.
    • (1992) Proceedings of the 1992 IEEE Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 61849107634 scopus 로고    scopus 로고
    • Bluetooth Special Interest Group
    • Bluetooth SIG (2007) Bluetooth 2.1 Specifications. Bluetooth Special Interest Group, http://www.bluetooth.com/NR/rdonlyres/ F8E8276A-3898-4EC6-B7DA-E5535258B056/6545/Core_V21_EDR.zip
    • (2007) Bluetooth 2.1 Specifications
  • 6
    • 33751031293 scopus 로고    scopus 로고
    • Čagalj, M., Hubaux, J-P., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I. and Srivastava, M. (2006a) 'Integrity (I) codes: message integrity protection and authentication over insecure channels', Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp.280-294, ieeexplore. ieee.org/xpls/abs_all.jsp?arnumber=1624018
    • Čagalj, M., Hubaux, J-P., Čapkun, S., Rengaswamy, R., Tsigkogiannis, I. and Srivastava, M. (2006a) 'Integrity (I) codes: message integrity protection and authentication over insecure channels', Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp.280-294, ieeexplore. ieee.org/xpls/abs_all.jsp?arnumber=1624018
  • 7
    • 31344438973 scopus 로고    scopus 로고
    • Čagalj, M., Čapkun, S. and Hubaux, J-P. (2006b) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE, 94, No. 2, pp.467-478, ieeexplore.ieee.org/xpls/ abs_all.jsp?arnumber=1580514
    • Čagalj, M., Čapkun, S. and Hubaux, J-P. (2006b) 'Key agreement in peer-to-peer wireless networks', Proceedings of the IEEE, Vol. 94, No. 2, pp.467-478, ieeexplore.ieee.org/xpls/ abs_all.jsp?arnumber=1580514
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • xpls/abs_all. jsp?arnumber=1056650
    • Dolev, D. and Yao, A.C. (1983) 'On the security of public key protocols', IEEE Transactions on Information Theory, Vol. 29, No. 2, pp.198-208, ieeexplore.ieee.org/xpls/abs_all. jsp?arnumber=1056650.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 10
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA Crypto-Bytes, Vol. 7, No. 1, pp.29-37, http://www.rsa.com/rsalabs/cryptobytes/Spring_2004_Cryptobytes.pdf.
    • (2004) RSA Crypto-Bytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 12
    • 38549131714 scopus 로고    scopus 로고
    • Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A. and OHare, T. (2007) 'Vulnerabilities in first-generation RFID-enabled credit cards', Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, 4886 of Lecture Notes in Computer Science, Springer-Verlag, Lowlands, Scarborough, Trinidad/ Tobago, pp.2-14, http://prisms.cs.umass.edu/~kevinfu/papers/ RFID-CC-manuscript.pdf
    • Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A. and OHare, T. (2007) 'Vulnerabilities in first-generation RFID-enabled credit cards', Proceedings of Eleventh International Conference on Financial Cryptography and Data Security, Volume 4886 of Lecture Notes in Computer Science, Springer-Verlag, Lowlands, Scarborough, Trinidad/ Tobago, pp.2-14, http://prisms.cs.umass.edu/~kevinfu/papers/ RFID-CC-manuscript.pdf
  • 15
    • 84911910826 scopus 로고    scopus 로고
    • Higher layer key exchange techniques for bluetooth security
    • Amsterdam, 24 October
    • Larsson, J-O. (2001) 'Higher layer key exchange techniques for bluetooth security', Open Group Conference, Amsterdam, 24 October.
    • (2001) Open Group Conference
    • Larsson, J.-O.1
  • 17
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Pointcheval, D, Ed, The 5th International Conference on Cryptology and Network Security, of, Springer, Suzhou, China, pp
    • Laur, S. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', in Pointcheval, D. (Ed.): The 5th International Conference on Cryptology and Network Security, Volume 4301 of Lecture Notes in Computer Science, Springer, Suzhou, China, pp.90-107, http://www.springerlink.com/content/w152n0455673652k/
    • (2006) Lecture Notes in Computer Science , vol.4301 , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 18
    • 27544489075 scopus 로고    scopus 로고
    • McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeingis-believing: using camera phones for human-verifiable authentication', Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.110-124, ieeexplore.ieee.org/xpls/abs_alljsp?arnumber=1425062
    • McCune, J.M., Perrig, A. and Reiter, M.K. (2005) 'Seeingis-believing: using camera phones for human-verifiable authentication', Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.110-124, ieeexplore.ieee.org/xpls/abs_alljsp?arnumber=1425062
  • 19
    • 0003508562 scopus 로고    scopus 로고
    • US Department of Commerce
    • National Institute of Standards and Technology (2000) Digital Signature Standard (DSS), US Department of Commerce, http:// csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
    • (2000) Digital Signature Standard (DSS)
  • 21
    • 34548850332 scopus 로고    scopus 로고
    • Newman, R., Yonge, L., Gavette, S. and Anderson, R. (2007) 'HomePlug AV security mechanisms', Proceedings of The International Symposium on Power Line Communications and Its Applications, pp.366-371, ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4231726
    • Newman, R., Yonge, L., Gavette, S. and Anderson, R. (2007) 'HomePlug AV security mechanisms', Proceedings of The International Symposium on Power Line Communications and Its Applications, pp.366-371, ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4231726
  • 22
    • 33745832230 scopus 로고    scopus 로고
    • SAS-based authenticated key agreement
    • Proceedings of The 9th International Workshop on Theory and Practice in Public Key Cryptography, of, Springer-Verlag, pp
    • Pasini, S. and Vaudenay, S. (2006) 'SAS-based authenticated key agreement', Proceedings of The 9th International Workshop on Theory and Practice in Public Key Cryptography, Volume 3958 of Lecture Notes in Computer Science, Springer-Verlag, pp.395-409, http://www. springerlink.com/content/r42826j7335254q2/
    • (2006) Lecture Notes in Computer Science , vol.3958 , pp. 395-409
    • Pasini, S.1    Vaudenay, S.2
  • 25
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hocwireless networks
    • Proceedings of the 7th International Workshop on Security Protocols, of, Springer-Verlag, pp
    • Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: Security issues for ad-hocwireless networks', Proceedings of the 7th International Workshop on Security Protocols, Volume 2133 of Lecture Notes in Computer Science, Springer-Verlag, pp. 172-194, http://www. springerlink.com/content/ru2015q381304428/
    • (1999) Lecture Notes in Computer Science , vol.2133 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 26
    • 38149072454 scopus 로고    scopus 로고
    • Security associations in personal networks: A comparative analysis
    • Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, of, Springer-Verlag, pp
    • Suomalainen, J., Valkonen, J. and Asokan, N. (2007) 'Security associations in personal networks: A comparative analysis', Proceedings of the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, Volume 4572 of Lecture Notes in Computer Science, Springer-Verlag, pp.43-57, http://www.springerlink.com/content/ dk04356586jg4g00/
    • (2007) Lecture Notes in Computer Science , vol.4572 , pp. 43-57
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 29
    • 61849085553 scopus 로고    scopus 로고
    • Usability testing for secure device pairing in home networks
    • September, Innsbruck, Austria, pp
    • Valkonen, J., Toivonen, A. and Karvonen, K. (2007) 'Usability testing for secure device pairing in home networks', UbiComp 2007 Workshop Proceedings, September, Innsbruck, Austria, pp.457-462.
    • (2007) UbiComp 2007 Workshop Proceedings , pp. 457-462
    • Valkonen, J.1    Toivonen, A.2    Karvonen, K.3
  • 30
    • 38349004892 scopus 로고    scopus 로고
    • Amigo: Proximity-based authentication of mobile devices
    • Proceedings of the Ninth International Conference on Ubiquitous Computing, of, Springer-Verlag, pp
    • Varshavsky, A., Scannell, A., LaMarca, A. and de Lara, E. (2007) 'Amigo: proximity-based authentication of mobile devices', Proceedings of the Ninth International Conference on Ubiquitous Computing, Volume 4717 of Lecture Notes in Computer Science, Springer-Verlag, pp.253-270, http://www.springerlink.com/content/37v827165x571333/
    • (2007) Lecture Notes in Computer Science , vol.4717 , pp. 253-270
    • Varshavsky, A.1    Scannell, A.2    LaMarca, A.3    de Lara, E.4
  • 31
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Advances in Cryptology, CRYPTO 2005 of, Springer-Verlag, pp
    • Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology - CRYPTO 2005 Volume 3621 of Lecture Notes in Computer Science, Springer-Verlag, pp.309-326, http://www.springerlink.com/content/ 5wak8q5hedk2fe4n/
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 32
    • 61849171434 scopus 로고    scopus 로고
    • Alliance
    • Wi-Fi Alliance Document, available at
    • Wi-Fi Alliance (2007) Wi-Fi Protected Setup Specification, Wi-Fi Alliance Document, available at http://www.wi-fi. org/ wifi-protected-setup/
    • Wi-Fi Protected Setup Specification
  • 33
    • 61849101287 scopus 로고    scopus 로고
    • Zimmermann, P.R. (1996) Pgpfone: Pretty Good Privacy Phone Owner's Manual, version 1.0 beta 5, appendix c. http://web.mit.edu/network/ pgpfone/manual/#PGP000057
    • Zimmermann, P.R. (1996) Pgpfone: Pretty Good Privacy Phone Owner's Manual, version 1.0 beta 5, appendix c. http://web.mit.edu/network/ pgpfone/manual/#PGP000057


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.