메뉴 건너뛰기




Volumn 11, Issue 2, 2012, Pages 337-351

Secure initialization of multiple constrained wireless devices for an unaided user

Author keywords

Message authentication protocol; out of band communication; usable security; wireless networks

Indexed keywords

AUXILIARY DEVICE; COMMUNICATION COST; DEPLOYMENT MECHANISMS; END USERS; EXECUTION TIME; FARADAY CAGE; MESSAGE AUTHENTICATION; MINIMAL ERRORS; MULTI-CHANNEL; OUT-OF-BAND; RADIO TRANSCEIVERS; USABILITY STUDIES; USABLE SECURITY; USER FRIENDLY; VISIBLE LIGHT; WIRELESS DEVICES; WIRELESS SENSOR;

EID: 84555178479     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2011.35     Document Type: Article
Times cited : (23)

References (41)
  • 1
    • 84855732027 scopus 로고    scopus 로고
    • Mica2 Specifications, https://www.eol.ucar.edu/rtf/facilities/isa/ internal/CrossBow/DataSheets/mica2.pdf, 2011.
    • (2011) Mica2 Specifications
  • 2
    • 84855749200 scopus 로고    scopus 로고
    • IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals
    • Mar.
    • N. Kushalnagar et al., "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals," IETF RFC 4919, http://tools.ietf.org/html/rfc4919, Mar. 2011.
    • (2011) IETF RFC 4919
    • Kushalnagar, N.1
  • 6
    • 0003035229 scopus 로고
    • A note on an error detection code for asymmetric channels
    • J.M. Berger, "A Note on an Error Detection Code for Asymmetric Channels," Information and Control, vol. 4, pp. 68-73, 1961.
    • (1961) Information and Control , vol.4 , pp. 68-73
    • Berger, J.M.1
  • 8
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • DOI 10.1109/JPROC.2005.862475
    • M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key Agreement in Peerto-Peer Wireless Networks," Proc. IEEE, Special Issue on Cryptography and Security, vol. 94, no. 2, pp. 467-478, Feb. 2006. (Pubitemid 43145998)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 9
    • 77953853641 scopus 로고    scopus 로고
    • Shake Them Up!: A movement-based pairing protocol for CPU-constrained devices
    • C. Castelluccia and P. Mutaf, "Shake Them Up!: A Movement-Based Pairing Protocol for CPU-Constrained Devices," Proc. ACM MobiSys, 2005.
    • (2005) Proc. ACM MobiSys
    • Castelluccia, C.1    Mutaf, P.2
  • 22
    • 77953304550 scopus 로고    scopus 로고
    • Group device pairing based secure sensor association and key management for body area networks
    • M. Li, S. Yu, W. Lou, and K. Ren, "Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks," Proc. IEEE INFOCOM, 2010.
    • (2010) Proc. IEEE INFOCOM
    • Li, M.1    Yu, S.2    Lou, W.3    Ren, K.4
  • 28
    • 79951833159 scopus 로고    scopus 로고
    • Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
    • L.H. Nguyen and A.W. Roscoe, "Authentication Protocols Based on Low-Bandwidth Unspoofable Channels: A Comparative Survey," J. Computer Security, vol. 19, pp. 139-201, 2011.
    • (2011) J. Computer Security , vol.19 , pp. 139-201
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 34
    • 84855742142 scopus 로고    scopus 로고
    • On the transmission-computation-energy tradeoff in wireless and fixed networks
    • P. Rost and G. Fettweis, "On the Transmission-Computation-Energy Tradeoff in Wireless and Fixed Networks," Computing Research Repository, http://arxiv.org/abs/1008.4565v1, 2010.
    • (2010) Computing Research Repository
    • Rost, P.1    Fettweis, G.2
  • 40
    • 33744908245 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05), 2005.
    • (2005) Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05)
    • Vaudenay, S.1
  • 41
    • 35348851489 scopus 로고    scopus 로고
    • Multichannel security protocols
    • DOI 10.1109/MPRV.2007.76
    • F.L. Wong and F. Stajano, "Multichannel Security Protocols," IEEE Pervasive Computing, Special Issue on Security and Privacy, vol. 6, no. 4, pp. 31-39, Oct.-Dec. 2007. (Pubitemid 47594392)
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.4 , pp. 31-39
    • Wong, F.L.1    Stajano, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.