메뉴 건너뛰기




Volumn 16, Issue 1, 2014, Pages 17-40

Secure device pairing: A survey

Author keywords

key management; machine to machine communication; pervasive computing; security

Indexed keywords


EID: 84894666219     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2013.111413.00196     Document Type: Article
Times cited : (42)

References (55)
  • 4
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 5
    • 0010227312 scopus 로고
    • Complexity of a determinate algorithm for the discrete logarithm
    • V. Nechaev, "Complexity of a determinate algorithm for the discrete logarithm," Mathematical Notes, vol. 55, no. 2, pp. 165-172, 1994.
    • (1994) Mathematical Notes , vol.55 , Issue.2 , pp. 165-172
    • Nechaev, V.1
  • 8
    • 74549221711 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement
    • Mar
    • L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone, "An efficient protocol for authenticated key agreement," Des. Codes Cryptography, vol. 28, no. 2, pp. 119-134, Mar. 2003.
    • (2003) Des. Codes Cryptography , vol.28 , Issue.2 , pp. 119-134
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 9
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Jun
    • W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptography, vol. 2, no. 2, pp. 107-125, Jun. 1992.
    • (1992) Des. Codes Cryptography , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Van Oorschot, P.C.2    Wiener, M.J.3
  • 11
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Trans. Inf. Theory, , vol. 29, no. 2, pp. 198-208, 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 12
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers: Authentication in ad-hoc wireless networks
    • D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong, "Talking to strangers: Authentication in ad-hoc wireless networks." in NDSS, 2002.
    • (2002) NDSS
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.C.4
  • 13
    • 84894653550 scopus 로고    scopus 로고
    • Deliverable d4. 3.2: Final version of the network-level security architecture specification
    • S. Mirzdeh, H. Affifi, and M. Duspiva, "Deliverable d4. 3.2: Final version of the network-level security architecture specification," IST-507102 MAGNET Project, Tech. Rep., 2005.
    • (2005) IST-507102 MAGNET Project, Tech. Rep
    • Mirzdeh, S.1    Affifi, H.2    Duspiva, M.3
  • 14
    • 84976825099 scopus 로고
    • How to expose an eavesdropper
    • Apr
    • R. L. Rivest and A. Shamir, "How to expose an eavesdropper," Commun. ACM, vol. 27, no. 4, pp. 393-394, Apr. 1984.
    • (1984) Commun ACM , vol.27 , Issue.4 , pp. 393-394
    • Rivest, R.L.1    Shamir, A.2
  • 16
    • 0028288854 scopus 로고
    • An attack on the interlock protocol when used for authentication
    • S. Bellovin and M. Merritt, "An attack on the interlock protocol when used for authentication," IEEE Trans. Inf. Theory, vol. 40, no. 1, pp. 273-275, 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.1 , pp. 273-275
    • Bellovin, S.1    Merritt, M.2
  • 20
    • 24344507806 scopus 로고    scopus 로고
    • Electromagnetic eavesdropping risks of flat-panel displays
    • Privacy Enhancing Technologies - 4th International Workshop, PET 2004
    • M. G. Kuhn, "Electromagnetic eavesdropping risks of flat-panel displays," in Proc. 4th int. conf. on Privacy Enhancing Technologies, ser. PET'04. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 88-107. (Pubitemid 41251999)
    • (2005) Lecture Notes in Computer Science , vol.3424 , pp. 88-107
    • Kuhn, M.G.1
  • 21
    • 27544489075 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • J. McCune, A. Perrig, and M. Reiter, "Seeing-is-believing: using camera phones for human-verifiable authentication," in IEEE Symp. Security and Privacy, 2005 , 2005, pp. 110-124. (Pubitemid 41543650)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 110-124
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 23
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, p. 2004, 2004.
    • (2004) RSA Cryptobytes , vol.7 , pp. 2004
    • Gehrmann, C.1    Nyberg, K.2
  • 24
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • Springer
    • D. R. Stinson, "Universal hashing and authentication codes," in Advances in Cryptology-CRYPTO'91. Springer, 1992, pp. 74-85.
    • (1992) Advances in Cryptology-CRYPTO'91 , pp. 74-85
    • Stinson, D.R.1
  • 25
    • 34247333484 scopus 로고    scopus 로고
    • The ephemeral pairing problem
    • ser. Lecture Notes in Computer Science, A. Juels, Ed Springer Berlin Heidelberg
    • J.-H. Hoepman, "The ephemeral pairing problem," in Financial Cryptography, ser. Lecture Notes in Computer Science, A. Juels, Ed. Springer Berlin Heidelberg, 2004, vol. 3110, pp. 212-226.
    • (2004) Financial Cryptography , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 26
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using human-memorable passwords," in Advances in Cryptology-EUROCRYPT 2001, ser. Lecture Notes in Computer Science, B. Pfitzmann, Ed. Springer Berlin Heidelberg, 2001, vol. 2045, pp. 475-494. (Pubitemid 33275849)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 27
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • ser. Lecture Notes in Computer Science, B. Preneel, Ed Springer Berlin Heidelberg
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Advances in Cryptology-EUROCRYPT 2000, ser. Lecture Notes in Computer Science, B. Preneel, Ed. Springer Berlin Heidelberg, 2000, vol. 1807, pp. 139-155.
    • (2000) Advances in Cryptology-EUROCRYPT 2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 29
    • 79951833159 scopus 로고    scopus 로고
    • Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
    • L. H. Nguyen and A. W. Roscoe, "Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey," J. Computer Security, vol. 19, no. 1, pp. 139-201, 2011.
    • (2011) J. Computer Security , vol.19 , Issue.1 , pp. 139-201
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 30
    • 31344438973 scopus 로고    scopus 로고
    • Key agreement in peer-to-peer wireless networks
    • DOI 10.1109/JPROC.2005.862475
    • M. Cagalj, S. Capkun, and J.-P. Hubaux, "Key agreement in peer-to peer wireless networks," Proc. IEEE, vol. 94, no. 2, pp. 467-478, 2006. (Pubitemid 43145998)
    • (2006) Proceedings of the IEEE , vol.94 , Issue.2 , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.-P.3
  • 32
    • 35348851489 scopus 로고    scopus 로고
    • Multichannel security protocols
    • DOI 10.1109/MPRV.2007.76
    • F. L. Wong and F. Stajano, "Multichannel security protocols," IEEE Pervasive Computing, vol. 6, no. 4, pp. 31-39, 2007. (Pubitemid 47594392)
    • (2007) IEEE Pervasive Computing , vol.6 , Issue.4 , pp. 31-39
    • Wong, F.L.1    Stajano, F.2
  • 34
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • ser. Lecture Notes in Computer Science, D. Stinson, Ed Springer Berlin Heidelberg
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology-CRYPTO'93, ser. Lecture Notes in Computer Science, D. Stinson, Ed. Springer Berlin Heidelberg, 1994, vol. 773, pp. 232-249.
    • (1994) Advances in Cryptology-CRYPTO'93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 35
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ser. STOC '95. New York, NY, USA: ACM
    • -, "Provably secure session key distribution: the three party case," in Proc. 27th annu. ACM symp. Theory of computing, ser. STOC '95. New York, NY, USA: ACM, 1995, pp. 57-66.
    • (1995) Proc. 27th Annu ACM Symp. Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 36
    • 84885941616 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • ser. Lecture Notes in Computer Science, D. Pointcheval, Y. Mu, and K. Chen, Eds Springer Berlin Heidelberg
    • S. Laur and K. Nyberg, "Efficient mutual data authentication using manually authenticated strings," in Cryptology and Network Security, ser. Lecture Notes in Computer Science, D. Pointcheval, Y. Mu, and K. Chen, Eds. Springer Berlin Heidelberg, 2006, vol. 4301, pp. 90-107.
    • (2006) Cryptology and Network Security , vol.4301 , pp. 90-107
    • Laur, S.1    Nyberg, K.2
  • 41
    • 33750291956 scopus 로고    scopus 로고
    • Multi-channel protocols for group key agreement in arbitrary topologies
    • ser. PERCOMW '06. Washington, DC, USA: IEEE Computer Society
    • F.-L. Wong and F. Stajano, "Multi-channel protocols for group key agreement in arbitrary topologies," in Proc. 4th annu. IEEE int. conf. Pervasive Computing and Commun. Workshops, ser. PERCOMW '06. Washington, DC, USA: IEEE Computer Society, 2006, pp. 246.
    • (2006) Proc. 4th Annu IEEE Int. Conf. Pervasive Computing and Commun. Workshops , pp. 246
    • Wong, F.-L.1    Stajano, F.2
  • 44
    • 40149095729 scopus 로고    scopus 로고
    • Authenticating ad hoc networks by comparison of short digests
    • Feb
    • -, "Authenticating ad hoc networks by comparison of short digests," Inf. Comput., vol. 206, no. 2-4, pp. 250-271, Feb. 2008.
    • (2008) Inf. Comput. , vol.206 , Issue.2-4 , pp. 250-271
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 45
    • 79951816837 scopus 로고    scopus 로고
    • [Online] Available
    • A. W. Roscoe, "Human-centred computer security," 2005. [Online]. Available: http://www.cs.ox.ac.uk/people/bill.roscoe/publications/113. pdf
    • (2005) Human-centred Computer Security
    • Roscoe, A.W.1
  • 46
    • 84555178479 scopus 로고    scopus 로고
    • Secure initialization of multiple constrained wireless devices for an unaided user
    • T. Perkovic, M. Cagalj, T. Mastelic, N. Saxena, and D. Begusic, "Secure initialization of multiple constrained wireless devices for an unaided user," IEEE Trans. Mobile Comput., vol. 11, no. 2, pp. 337-351, 2012.
    • (2012) IEEE Trans. Mobile Comput. , vol.11 , Issue.2 , pp. 337-351
    • Perkovic, T.1    Cagalj, M.2    Mastelic, T.3    Saxena, N.4    Begusic, D.5
  • 47
    • 78649983666 scopus 로고    scopus 로고
    • Sas-based group authentication and key agreement protocols
    • S. Laur and S. Pasini, "Sas-based group authentication and key agreement protocols," in In Public Key Cryptography, 2008.
    • (2008) Public Key Cryptography
    • Laur, S.1    Pasini, S.2
  • 49
    • 15344345559 scopus 로고    scopus 로고
    • A secure and scalable Group Key Exchange system
    • DOI 10.1016/j.ipl.2005.01.003, PII S002001900500013X
    • -, "A secure and scalable group key exchange system," Information Processing Lett., vol. 94, no. 3, pp. 137-143, 2005. (Pubitemid 40391340)
    • (2005) Information Processing Letters , vol.94 , Issue.3 , pp. 137-143
    • Burmester, M.1    Desmedt, Y.2
  • 50
    • 33750283263 scopus 로고    scopus 로고
    • Contributory group key agreement protocols, revisited for mobile ad-hoc groups
    • M. Manulis, "Contributory group key agreement protocols, revisited for mobile ad-hoc groups," IEEE Int. Conf. Mobile Adhoc and Sensor Systems Conf., vol. 0, p. 818, 2005.
    • (2005) IEEE Int. Conf. Mobile Adhoc and Sensor Systems Conf. , vol.0 , pp. 818
    • Manulis, M.1
  • 52
    • 78650034784 scopus 로고    scopus 로고
    • Groupthink: Usability of secure group association for wireless devices
    • ser. Ubicomp '10. New York, NY, USA: ACM
    • R. Nithyanand, N. Saxena, G. Tsudik, and E. Uzun, "Groupthink: usability of secure group association for wireless devices," in Proc. 12th ACM int. conf. on Ubiquitous computing, ser. Ubicomp '10. New York, NY, USA: ACM, 2010, pp. 331-340.
    • (2010) Proc. 12th ACM Int. Conf. on Ubiquitous Computing , pp. 331-340
    • Nithyanand, R.1    Saxena, N.2    Tsudik, G.3    Uzun, E.4
  • 53
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. Carter and M. N. Wegman, "Universal classes of hash functions," J. Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
    • (1979) J. Computer and System Sciences , vol.18 , Issue.2 , pp. 143-154
    • Carter, J.1    Wegman, M.N.2
  • 54
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • DOI 10.1016/0022-0000(81)90033-7
    • M. N. Wegman and J. Carter, "New hash functions and their use in authentication and set equality," J. Computer and System Sciences, vol. 22, no. 3, pp. 265-279, 1981. (Pubitemid 12444638)
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman Mark, N.1    Carter J.Lawrence2
  • 55
    • 17744380057 scopus 로고
    • Coin flipping by telephone a protocol for solving impossible problems
    • Jan
    • M. Blum, "Coin flipping by telephone a protocol for solving impossible problems," SIGACT News, vol. 15, no. 1, pp. 23-27, Jan. 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 23-27
    • Blum, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.