메뉴 건너뛰기




Volumn 4, Issue 1-2, 2009, Pages 57-68

Using audio in secure device pairing

Author keywords

Audio; Human assisted authentication; Man in the middle attacks; MITM; Personal device; Secure device pairing

Indexed keywords

ELECTRON DEVICES; NETWORK SECURITY;

EID: 61849184822     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2009.023426     Document Type: Article
Times cited : (37)

References (44)
  • 2
    • 61849103248 scopus 로고    scopus 로고
    • Wi-fi protected setup specification
    • January
    • Alliance, W. (2007) 'Wi-fi protected setup specification', WiFi Alliance Document, January.
    • (2007) WiFi Alliance Document
    • Alliance, W.1
  • 11
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C. and Nyberg, K. (2004) 'Manual authentication for wireless devices', RSA Cryptobytes, Vol. 7, No. 1, p.2937.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 2937
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 12
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • Mitchell, C.J, Eds, IEE, London, pp
    • Gehrmann, C. and Nyberg, K. (2004) 'Security in personal area networks', in Mitchell, C.J. (Eds.): Security for Mobility, IEE, London, pp.191-230.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 14
    • 61849147703 scopus 로고    scopus 로고
    • Group, B.S.I. (2006) Simple Pairing Whitepaper, http:// www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.
    • Group, B.S.I. (2006) Simple Pairing Whitepaper, http:// www.bluetooth.com/Bluetooth/Apply/Technology/Research/Simple_Pairing.htm.
  • 18
    • 0142156649 scopus 로고    scopus 로고
    • Secure spontaneous device association
    • Dey, A.K, Schmidt, A. and McCarthy, J.F, Eds, Ubicomp, of, Springer, pp
    • Kindberg, T. and Zhang, K. (2003a) 'Secure spontaneous device association', in Dey, A.K., Schmidt, A. and McCarthy, J.F. (Eds.): Ubicomp, Vol. 2864 of Lecture Notes in Computer Science, Springer, pp.124-131.
    • (2003) Lecture Notes in Computer Science , vol.2864 , pp. 124-131
    • Kindberg, T.1    Zhang, K.2
  • 19
    • 35248872559 scopus 로고    scopus 로고
    • Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
    • Kindberg, T. and Zhang, K. (2003b) 'Validating and securing spontaneous associations between wireless devices', in Boyd, C. and Mao, W. (Eds.): ISC, Vol. 2851 of Lecture Notes in Computer Science, Springer, pp.44-53.
  • 22
    • 84911910826 scopus 로고    scopus 로고
    • Higher Layer Key Exchange Techniques for Bluetooth Security
    • Amsterdam
    • Larsson, J-O. (2001) Higher Layer Key Exchange Techniques for Bluetooth Security, Open Group Conference, Amsterdam.
    • (2001) Open Group Conference
    • Larsson, J.-O.1
  • 23
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • Pointcheval, D, Mu, Y. and Chen, K, Eds, CANS, of, Springer, pp
    • Laur, S., Asokan, N. and Nyberg, K. (2006) 'Efficient mutual data authentication using manually authenticated strings', in Pointcheval, D., Mu, Y. and Chen, K. (Eds.): CANS, Vol. 4301 of Lecture Notes in Computer Science, Springer, pp.90-107.
    • (2006) Lecture Notes in Computer Science , vol.4301 , pp. 90-107
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 24
    • 61849117691 scopus 로고    scopus 로고
    • available at
    • Levien, R. (1996) Pgp Snowflake, Source code available at: http:// packages.debian.org/testing/graphics/snowflake.html
    • (1996) Pgp Snowflake, Source code
    • Levien, R.1
  • 26
    • 33947642342 scopus 로고
    • Secure Communication Method and Apparatus
    • US Patent Number 5,450,493
    • Maher, D.P. (1995) Secure Communication Method and Apparatus, US Patent Number 5,450,493.
    • (1995)
    • Maher, D.P.1
  • 28
    • 38149135757 scopus 로고    scopus 로고
    • Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction
    • Innsbruck, Austria, pp
    • Mayrhofer, R., Gellersen, H. and Hazas, M. (2007) 'Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction', Ubicomp, Innsbruck, Austria, pp.199-216.
    • (2007) Ubicomp , pp. 199-216
    • Mayrhofer, R.1    Gellersen, H.2    Hazas, M.3
  • 30
    • 61849134610 scopus 로고    scopus 로고
    • Microsoft (2006) Windows Connect Now-ufd and Windows Vista Specification, version 1.0, http://www.microsoft.com/whdc/Rally/ WCN-UFD Vistaspec.mspx, Microsoft
    • Microsoft (2006) Windows Connect Now-ufd and Windows Vista Specification, version 1.0, http://www.microsoft.com/whdc/Rally/ WCN-UFD Vistaspec.mspx, Microsoft
  • 31
    • 61849101290 scopus 로고    scopus 로고
    • Miller, S., Neuman, C., Schiller, J. and Saltzer, J. (1987) 'Kerberos authentication and authorization system', Project Athena Technical Plan, section E.2.1.
    • Miller, S., Neuman, C., Schiller, J. and Saltzer, J. (1987) 'Kerberos authentication and authorization system', Project Athena Technical Plan, section E.2.1.
  • 32
    • 33745832230 scopus 로고    scopus 로고
    • SAS-based authenticated key agreement
    • Yung, M, Dodis, Y, Kiayias, A. and Malkin, T, Eds, Public Key Cryptography, Springer, pp
    • Pasini, S. and Vaudenay, S. (2006) 'SAS-based authenticated key agreement', in Yung, M., Dodis, Y., Kiayias, A. and Malkin, T. (Eds.): Public Key Cryptography, Vol. 3958, Lecture Notes in Computer Science, Springer, pp.395-409.
    • (2006) Lecture Notes in Computer Science , vol.3958 , pp. 395-409
    • Pasini, S.1    Vaudenay, S.2
  • 36
    • 61849138099 scopus 로고    scopus 로고
    • Soriente, C., Tsudik, G. and Uzun, E. (2007) 'Hapadep: Human asisted pure audio device pairing', Cryptology ePrint Archive, Report 2007/093.
    • Soriente, C., Tsudik, G. and Uzun, E. (2007) 'Hapadep: Human asisted pure audio device pairing', Cryptology ePrint Archive, Report 2007/093.
  • 37
    • 61849134199 scopus 로고    scopus 로고
    • Specification, W.U, 2006 Association Models Supplement, revision 1.0, In USB Implementers Forum
    • Specification, W.U. (2006) Association Models Supplement, revision 1.0, In USB Implementers Forum, http://www.usb.org/developers/wusb/
  • 38
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Springer, pp
    • Stajano, F. and Anderson, R. (2000) 'The resurrecting duckling: Security issues for ad-hoc wireless networks', Security Protocols: 7th International Workshop, Springer, pp.204-214.
    • (2000) Security Protocols: 7th International Workshop , pp. 204-214
    • Stajano, F.1    Anderson, R.2
  • 41
    • 61849148607 scopus 로고    scopus 로고
    • Usability Analysis of Secure Pairing Methods
    • Technical Report NRC-TR-2007-002, Nokia Research Center
    • Uzun, E., Karvonen, K. and Asokan, N. (2007) Usability Analysis of Secure Pairing Methods, Technical Report NRC-TR-2007-002, Nokia Research Center.
    • (2007)
    • Uzun, E.1    Karvonen, K.2    Asokan, N.3
  • 42
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • Advances in Cryptology, CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara, California, USA, Springer-Verlag, August, pp
    • Vaudenay, S. (2005) 'Secure communications over insecure channels based on short authenticated strings', Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Vol. 3621, Lecture Notes in Computer Science, Santa Barbara, California, USA, Springer-Verlag, August, pp.309-326.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.