메뉴 건너뛰기




Volumn 8, Issue 1, 2013, Pages 163-173

COKE crypto-less over-the-air key establishment

Author keywords

anonymous channels; key establishment; Wireless security

Indexed keywords

ANONYMOUS CHANNELS; KEY ESTABLISHMENTS; KEY-ESTABLISHMENT; PLAINTEXT; PROBABILISTIC PROTOCOLS; RESOURCE-CONSTRAINED; SHARED SECRETS; WIRELESS DEVICES; WIRELESS EMBEDDED SYSTEMS; WIRELESS SECURITY;

EID: 84872115312     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2226718     Document Type: Article
Times cited : (20)

References (43)
  • 1
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 2
    • 38349033100 scopus 로고    scopus 로고
    • Security and Privacy in Ad-Hoc and Sensor Networks, ser. Lecture Notes in Computer Science. Berlin/Heidelberg: Springer
    • D. Kirovski, M. Sinclair, and D. Wilson, "The martini synch: Joint fuzzy hashing via error correction," in Security and Privacy in Ad-Hoc and Sensor Networks, ser. Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2007, vol. 4572, pp. 16-30.
    • (2007) The Martini Synch: Joint Fuzzy Hashing Via Error Correction , vol.4572 , pp. 16-30
    • Kirovski, D.1    Sinclair, M.2    Wilson, D.3
  • 3
    • 65349086799 scopus 로고    scopus 로고
    • Shake well before use: Intuitive and secure pairing of mobile devices
    • Jun
    • R. Mayrhofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Trans. Mobile Comput., vol. 8, no. 6, pp. 792-806, Jun. 2009.
    • (2009) IEEE Trans. Mobile Comput. , vol.8 , Issue.6 , pp. 792-806
    • Mayrhofer, R.1    Gellersen, H.2
  • 5
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. MOBICOM 2009, 2009, pp. 321-332.
    • (2009) Proc. MOBICOM , vol.2009 , pp. 321-332
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4    Patwari, N.5    Krishnamurthy, S.V.6
  • 6
    • 77952329424 scopus 로고    scopus 로고
    • Secret keys from entangled sensor motes: Implementation and analysis
    • ACM
    • M.Wilhelm, I. Martinovic, and J. B. Schmitt, "Secret keys from entangled sensor motes: Implementation and analysis," in Proc. WiSec'10, 2010, pp. 139-144, ACM.
    • (2010) Proc. WiSec'10 , pp. 139-144
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.B.3
  • 7
    • 0022099415 scopus 로고
    • A secure and useful keyless cryptosystem
    • M. Young, "A secure and useful keyless cryptosystem," Inf. Process. Lett., pp. 35-38, 1985.
    • (1985) Inf. Process. Lett. , pp. 35-38
    • Young, M.1
  • 8
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up!: A movement-based pairing protocol for cpu-constrained devices
    • ACM
    • C. Castelluccia and P. Mutaf, "Shake them up!: A movement-based pairing protocol for cpu-constrained devices," in Proc. MobiSys'05, 2005, pp. 51-64, ACM.
    • (2005) Proc. MobiSys'05 , pp. 51-64
    • Castelluccia, C.1    Mutaf, P.2
  • 10
    • 77954527646 scopus 로고    scopus 로고
    • Robust uncorrelated bit extraction methodologies for wireless sensors
    • ACM
    • J. Croft, N. Patwari, and S. K. Kasera, "Robust uncorrelated bit extraction methodologies for wireless sensors," in Proc. IPSN'10, 2010, pp. 70-81, ACM.
    • (2010) Proc. IPSN'10 , pp. 70-81
    • Croft, J.1    Patwari, N.2    Kasera, S.K.3
  • 11
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • ACM
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. CCS'07, 2007, pp. 401-410, ACM.
    • (2007) Proc. CCS'07 , pp. 401-410
    • Azimi-Sadjadi, B.1    Kiayias, A.2    Mercado, A.3    Yener, B.4
  • 12
    • 35048881618 scopus 로고    scopus 로고
    • Are you with me? Using accelerometers to determine if two devices are carried by the same person
    • Berlin/Heidelberg: Springer 2004
    • J. Lester, B. Hannaford, and G. Borriello, "Are you with me? - Using accelerometers to determine if two devices are carried by the same person," in Book Series Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, 2004, vol. 3001/2004, pp. 33-50.
    • (2004) Book Series Lecture Notes in Computer Science , vol.3001 , pp. 33-50
    • Lester, J.1    Hannaford, B.2    Borriello, G.3
  • 13
    • 84945588227 scopus 로고    scopus 로고
    • Smart-its friends: A technique for users to easily establish connections between smart artefacts
    • Ubicomp 2001: Ubiquitous Computing
    • L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen, "Smart-its friends: A technique for users to easily establish connections between smart artefacts," in Ubi- Comp'01. London, U.K.: Springer-Verlag, 2001, pp. 116-122. (Pubitemid 33347301)
    • (2001) Lecture Notes in Computer Science , Issue.2201 , pp. 116-122
    • Holmquist, L.E.1    Mattern, F.2    Schiele, B.3    Alahuhta, P.4    Beigl, M.5    Gellersen, H.-W.6
  • 14
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Mar
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, Mar. 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 15
    • 62449274873 scopus 로고    scopus 로고
    • Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
    • Mar
    • J. Guajardo, B. Škorić, P. Tuyls, S. S. Kumar, T. Bel, A. H. Blom, and G.-J. Schrijen, "Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions," Inf. Syst. Frontiers, vol. 11, no. 1, pp. 19-41, Mar. 2009.
    • (2009) Inf. Syst. Frontiers , vol.11 , Issue.1 , pp. 19-41
    • Guajardo, J.1    Škorić, B.2    Tuyls, P.3    Kumar, S.S.4    Bel, T.5    Blom, A.H.6    Schrijen, G.-J.7
  • 18
    • 62949108474 scopus 로고    scopus 로고
    • Measurement-based frame error model for simulating outdoor wi-fi networks
    • Mar
    • P. Barsocchi, G. Oligeri, and F. Potorti, "Measurement-based frame error model for simulating outdoor wi-fi networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1154-1158, Mar. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1154-1158
    • Barsocchi, P.1    Oligeri, G.2    Potorti, F.3
  • 19
    • 0019045740 scopus 로고
    • Empirical formula for propagation loss in land mobile radio services
    • M. Hata, "Empirical formula for propagation loss in land mobile radio services," IEEE Trans. Veh. Technol., vol. 29, no. 3, pp. 317-325, Aug. 1980. (Pubitemid 11430748)
    • (1980) IEEE Transactions on Vehicular Technology , vol.VT-29 , Issue.3 , pp. 317-325
    • Hata Masaharu1
  • 20
    • 66649125215 scopus 로고    scopus 로고
    • Physically motivated fast-fading model for indoor peer-to-eer channels
    • May
    • B. Bandemer, C. Oestges, N. Czink, and A. Paulraj, "Physically motivated fast-fading model for indoor peer-to-eer channels," Electron. Lett., vol. 45, no. 10, pp. 515-517, May 2009.
    • (2009) Electron. Lett. , vol.45 , Issue.10 , pp. 515-517
    • Bandemer, B.1    Oestges, C.2    Czink, N.3    Paulraj, A.4
  • 25
  • 27
    • 84872115831 scopus 로고    scopus 로고
    • Active Attacks Against Modulation-Based Radiometric Identification Rensselaer Polytechnic Institute, Department of Computer Science
    • E. Matthew and Y. Blent, Active Attacks Against Modulation-Based Radiometric Identification Rensselaer Polytechnic Institute, Department of Computer Science, Tech. Rep., 2009.
    • (2009) Tech. Rep.
    • Matthew, E.1    Blent, Y.2
  • 28
    • 70350625235 scopus 로고    scopus 로고
    • Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
    • Berlin, Heidelberg: Springer-Verlag
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Tapiador, and A. Ribagorda, "Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol," in Information Security Applications. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 56-68.
    • (2009) Information Security Applications , pp. 56-68
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Tapiador, J.M.3    Ribagorda, A.4
  • 30
    • 80051904512 scopus 로고    scopus 로고
    • The communication and computation cost of wireless security: Extended abstract
    • ACM
    • D. Singelee, S. Seys, L. Batina, and I. Verbauwhede, "The communication and computation cost of wireless security: Extended abstract," in Proc. WiSec'11, 2011, pp. 1-4, ACM.
    • (2011) Proc. WiSec'11 , pp. 1-4
    • Singelee, D.1    Seys, S.2    Batina, L.3    Verbauwhede, I.4
  • 31
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and G. Solomon, "Polynomial codes over certain finite fields," J. Soc. Indust. Appl. Math., vol. 8, pp. 300-304, 1960.
    • (1960) J. Soc. Indust. Appl. Math. , vol.8 , pp. 300-304
    • Reed, I.S.1    Solomon, G.2
  • 32
    • 0032178374 scopus 로고    scopus 로고
    • A digital fountain approach to reliable distribution of bulk data
    • J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, "A digital fountain approach to reliable distribution of bulk data," SIGCOMM Comput. Commun. Rev., vol. 28, no. 4, pp. 56-67, Oct. 1998. (Pubitemid 128566447)
    • (1998) Computer Communication Review , vol.28 , Issue.4 , pp. 56-67
    • Byers, J.W.1    Luby, M.2    Mitzenmacher, M.3    Rege, A.4
  • 36
    • 84872100052 scopus 로고    scopus 로고
    • An introduction to openssl programming
    • Sep
    • E. Rescorla, "An introduction to openssl programming," Linux J., vol. 2001, no. 89, p. 3, Sep. 2001.
    • (2001) Linux J. , vol.2001 , Issue.89 , pp. 3
    • Rescorla, E.1
  • 40
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • DOI 10.1007/s00145-001-0009-4
    • A. K. Lenstra and E. R. Verheul, "Selecting cryptographic key sizes," J. Cryptology, vol. 14, pp. 255-293, 1999. (Pubitemid 33770276)
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 41
    • 70350585044 scopus 로고    scopus 로고
    • Energy-efficient implementation of ECDH key exchange for wireless sensor networks
    • Berlin, Heidelberg: Springer-Verlag
    • C. Lederer, R. Mader, M. Koschuch, J. Grosschädl, A. Szekely, and S. Tillich, Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks, ser. WISTP'09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 112-127.
    • (2009) Ser. WISTP'09 , pp. 112-127
    • Lederer, C.1    Mader, R.2    Koschuch, M.3    Grosschädl, J.4    Szekely, A.5    Tillich, S.6
  • 42
    • 84870059338 scopus 로고    scopus 로고
    • Shake: Single hash key establishment for resource constrained devices
    • Jan
    • P. Barsocchi, G. Oligeri, and C. Soriente, "Shake: Single hash key establishment for resource constrained devices," Ad Hoc Networks, vol. 11, no. 1, pp. 288-297, Jan. 2012.
    • (2012) Ad Hoc Networks , vol.11 , Issue.1 , pp. 288-297
    • Barsocchi, P.1    Oligeri, G.2    Soriente, C.3
  • 43
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S.Mathur, N. M. C. Ye, and A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. MobiCom, 2008, pp. 128-139.
    • (2008) Proc. MobiCom , pp. 128-139
    • Mathur, S.1    Ye, N.M.C.2    Reznik, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.