메뉴 건너뛰기




Volumn , Issue , 2011, Pages 211-224

ProxiMate: Proximity-based secure pairing using ambient wireless signals

Author keywords

information theoretic secrecy; random processes; secure pairing; wireless channels; wireless devices

Indexed keywords

CRYPTOGRAPHIC KEY; DIFFIE HELLMAN; EXPERIMENTAL PROTOTYPE; INFORMATION-THEORETIC SECRECY; OPEN-SOURCE; PHYSICAL PROXIMITY; RF SOURCES; SECRET KEY; SECURE PAIRING; SPEED-UPS; TIME VARYING; TRUST RELATIONSHIP; WIRELESS CHANNELS; WIRELESS DEVICES; WIRELESS ENVIRONMENT; WIRELESS SIGNALS;

EID: 79961063540     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1999995.2000016     Document Type: Conference Paper
Times cited : (229)

References (22)
  • 4
    • 85027496257 scopus 로고
    • Secret key reconciliation by public discussion
    • Advances in Crytology Proc. - Eurocrypt '93
    • G. Brassard and L. Salvail, "Secret key reconciliation by public discussion," Advances in Crytology Proc. - Eurocrypt '93, Lecture Notes in Computer Science, vol. 765, pp. 410-423, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 5
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 8
    • 79961042146 scopus 로고    scopus 로고
    • "http://gnuradio.org/trac."
  • 10
    • 39049106144 scopus 로고    scopus 로고
    • A nearest-neighbor approach to estimating divergence between continuous random vectors
    • Q. Wang, S. R. Kulkarni, and S. Verdu, "A nearest-neighbor approach to estimating divergence between continuous random vectors," in Int. Symp. on Inform. Theory, 2006, pp. 242-246.
    • (2006) Int. Symp. on Inform. Theory , pp. 242-246
    • Wang, Q.1    Kulkarni, S.R.2    Verdu, S.3
  • 13
    • 77952604175 scopus 로고    scopus 로고
    • Information-theoretically secret key generation for fading wireless channels
    • Accepted for publication at the June preprint available at 2010
    • C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," Accepted for publication at the IEEE Trans. on Information Forensics and Security, June 2010, preprint available at http://arxiv.org/abs/ 0910.5027, 2010.
    • (2010) IEEE Trans. on Information Forensics and Security
    • Ye, C.1    Mathur, S.2    Reznik, A.3    Shah, Y.4    Trappe, W.5    Mandayam, N.6
  • 15
    • 79551483702 scopus 로고    scopus 로고
    • Tool release: Gathering 802.11n traces with channel state information
    • [Online]. Available
    • D. Halperin, W. Hu, A. Sheth, and D. Wetherall, "Tool release: gathering 802.11n traces with channel state information,"SIGCOMM Comput. Commun. Rev., vol. 41, pp. 53-53. [Online]. Available: http://doi.acm.org/10. 1145/1925861.1925870
    • SIGCOMM Comput. Commun. Rev. , vol.41 , pp. 53-53
    • Halperin, D.1    Hu, W.2    Sheth, A.3    Wetherall, D.4
  • 17
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • R. Mayrhofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Transactions on Mobile Computing, vol. 8, no. 6, pp. 792-806, 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , Issue.6 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 18
    • 38149059722 scopus 로고    scopus 로고
    • Key generation based on acceleration data of shaking processes
    • D. Bichleri, G. Stromberg, and M. Huemer, "Key generation based on acceleration data of shaking processes," Ubiquitous Computing 2007, pp. 304-317, 2007.
    • (2007) Ubiquitous Computing 2007 , pp. 304-317
    • Bichleri, D.1    Stromberg, G.2    Huemer, M.3
  • 19
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • ser. CCS '03. New York, NY, USA: ACM, [Online]. Available
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in Proceedings of the 10th ACM conference on Computer and communications security, ser. CCS '03. New York, NY, USA: ACM, 2003, pp. 52-61. [Online]. Available: http://doi.acm.org/10.1145/948109.948119
    • (2003) Proceedings of the 10th ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.