메뉴 건너뛰기




Volumn 84, Issue , 2015, Pages 46-63

ESC: An efficient, scalable, and crypto-less solution to secure wireless networks

Author keywords

Anonymous channels; Communication system security; Cryptoless protocols; Key establishment; Wireless communications

Indexed keywords

CRYPTOGRAPHY; MOBILE SECURITY; NETWORK PROTOCOLS; PEER TO PEER NETWORKS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84929956069     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2015.04.006     Document Type: Article
Times cited : (9)

References (49)
  • 1
    • 84872115312 scopus 로고    scopus 로고
    • COKE: Crypto-less over-The-Air key establishment
    • R. Di Pietro, and G. Oligeri COKE: crypto-less over-the-air key establishment IEEE Trans. Inf. Forensics Secur. 8 1 2013 163 173 10.1109/TIFS.2012.2226718
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.1 , pp. 163-173
    • Di Pietro, R.1    Oligeri, G.2
  • 2
    • 84878125727 scopus 로고    scopus 로고
    • United we stand: Intrusion resilience in mobile unattended WSNs
    • R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik United we stand: intrusion resilience in mobile unattended WSNs IEEE Trans. Mob. Comput. 12 7 2013 1456 1468 http://doi.ieeecomputersociety.org/10.1109/TMC.2012.126
    • (2013) IEEE Trans. Mob. Comput. , vol.12 , Issue.7 , pp. 1456-1468
    • Di Pietro, R.1    Oligeri, G.2    Soriente, C.3    Tsudik, G.4
  • 3
    • 84894743905 scopus 로고    scopus 로고
    • Asymptotic analysis on secrecy capacity in large-scale wireless networks
    • J. Zhang, L. Fu, and X. Wang Asymptotic analysis on secrecy capacity in large-scale wireless networks IEEE/ACM Trans. Networking 22 1 2013 66 79 10.1109/TNET.2013.2244230
    • (2013) IEEE/ACM Trans. Networking , vol.22 , Issue.1 , pp. 66-79
    • Zhang, J.1    Fu, L.2    Wang, X.3
  • 4
    • 79955482990 scopus 로고    scopus 로고
    • On the price of security in large-scale wireless ad hoc networks
    • C. Zhang, Y. Song, Y. Fang, and Y. Zhang On the price of security in large-scale wireless ad hoc networks IEEE/ACM Transa. Networking 19 2 2011 319 332 10.1109/TNET.2011.2106162
    • (2011) IEEE/ACM Transa. Networking , vol.19 , Issue.2 , pp. 319-332
    • Zhang, C.1    Song, Y.2    Fang, Y.3    Zhang, Y.4
  • 7
    • 84870059338 scopus 로고    scopus 로고
    • SHAKE: Single hash key establishment for resource constrained devices
    • P. Barsocchi, G. Oligeri, and C. Soriente SHAKE: single hash key establishment for resource constrained devices Ad Hoc Networks 11 1 2013 288 297
    • (2013) Ad Hoc Networks , vol.11 , Issue.1 , pp. 288-297
    • Barsocchi, P.1    Oligeri, G.2    Soriente, C.3
  • 10
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • ACM New York, NY, USA
    • S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy On the effectiveness of secret key extraction from wireless signal strength in real environments MobiCom '09 2009 ACM New York, NY, USA 321 332
    • (2009) MobiCom '09 , pp. 321-332
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4    Patwari, N.5    Krishnamurthy, S.V.6
  • 11
    • 33645265197 scopus 로고
    • Key exchange using 'keyless cryptography'
    • B. Alpern, and F.B. Schneider Key exchange using 'keyless cryptography' Inf. Process. Lett. 16 2 1983 79 81
    • (1983) Inf. Process. Lett. , vol.16 , Issue.2 , pp. 79-81
    • Alpern, B.1    Schneider, F.B.2
  • 12
    • 0022099415 scopus 로고
    • A secure and useful "keyless cryptosystem"
    • M. Yung A secure and useful "keyless cryptosystem" Inf. Process. Lett. 21 1 1985 35 38
    • (1985) Inf. Process. Lett. , vol.21 , Issue.1 , pp. 35-38
    • Yung, M.1
  • 13
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • R. Canetti, and H. Krawczyk Analysis of key-exchange protocols and their use for building secure channels EUROCRYPT 2001 453 474
    • (2001) EUROCRYPT , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 2 1978 120 126
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 84865611232 scopus 로고    scopus 로고
    • A practical man-in-The-Middle attack on signal-based key generation protocols
    • S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic A practical man-in-the-middle attack on signal-based key generation protocols ESORICS 2012 235 252
    • (2012) ESORICS , pp. 235-252
    • Eberz, S.1    Strohmeier, M.2    Wilhelm, M.3    Martinovic, I.4
  • 21
    • 84872727645 scopus 로고    scopus 로고
    • On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT
    • S.-C. Lin, and P.-H. Lin On secrecy capacity of fast fading multiple-input wiretap channels with statistical CSIT IEEE Trans. Inf. Forensics Secur. 8 2 2013 414 419 10.1109/TIFS.2012.2233735
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.2 , pp. 414-419
    • Lin, S.-C.1    Lin, P.-H.2
  • 26
    • 84871231488 scopus 로고    scopus 로고
    • On physical-layer identification of wireless devices
    • B. Danev, D. Zanetti, and S. Capkun On physical-layer identification of wireless devices ACM Comput. Surv. 45 1 2012 6:1 6:29
    • (2012) ACM Comput. Surv. , vol.45 , Issue.1 , pp. 61-629
    • Danev, B.1    Zanetti, D.2    Capkun, S.3
  • 30
    • 1042289031 scopus 로고    scopus 로고
    • The number of neighbors needed for connectivity of wireless networks
    • F. Xue, and P.R. Kumar The number of neighbors needed for connectivity of wireless networks Wireless Networks 10 2004 169 181
    • (2004) Wireless Networks , vol.10 , pp. 169-181
    • Xue, F.1    Kumar, P.R.2
  • 32
    • 31444451524 scopus 로고    scopus 로고
    • Modular proofs for key exchange: Rigorous optimizations in the Canetti-Krawczyk model
    • Y. Hitchcock, C. Boyd, and J.M.G. Nieto Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model Appl. Algebra Eng. Commun. Comput. 16 6 2006 405 438
    • (2006) Appl. Algebra Eng. Commun. Comput. , vol.16 , Issue.6 , pp. 405-438
    • Hitchcock, Y.1    Boyd, C.2    Nieto, J.M.G.3
  • 33
    • 63449093784 scopus 로고    scopus 로고
    • Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach
    • Y.S.T. Tin, C. Boyd, and J.M.G. Nieto Provably secure mobile key exchange: applying the Canetti-Krawczyk approach ACISP 2003 166 179
    • (2003) ACISP , pp. 166-179
    • Tin, Y.S.T.1    Boyd, C.2    Nieto, J.M.G.3
  • 34
    • 79251639172 scopus 로고    scopus 로고
    • A highly secure identity-based authenticated key-exchange protocol for satellite communication
    • Z. Yantao, and M. Jianfeng A highly secure identity-based authenticated key-exchange protocol for satellite communication J. Commun. Networks 12 6 2010 592 599 10.1109/JCN.2010.6388306
    • (2010) J. Commun. Networks , vol.12 , Issue.6 , pp. 592-599
    • Yantao, Z.1    Jianfeng, M.2
  • 35
    • 79951935674 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption IEEE Trans. Inf. Theory 57 3 2011 1786 1802 10.1109/TIT.2011.2104470
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.3 , pp. 1786-1802
    • Libert, B.1    Vergnaud, D.2
  • 36
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • D. Ma, C. Soriente, and G. Tsudik New adversary and new threats: Security in unattended sensor networks IEEE Network 23 2 2009 43 48
    • (2009) IEEE Network , vol.23 , Issue.2 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 37
    • 84883314860 scopus 로고    scopus 로고
    • Secure key generation in sensor networks based on frequency-selective channels
    • M. Wilhelm, I. Martinovich, and J. Smith Secure key generation in sensor networks based on frequency-selective channels IEEE J. Sel. Areas Commun. 31 9 2013 1779 1790
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1779-1790
    • Wilhelm, M.1    Martinovich, I.2    Smith, J.3
  • 40
    • 3142543313 scopus 로고    scopus 로고
    • Determining strengths for public keys used for exchanging symmetric keys
    • April 2004
    • H. Orman, P. Hoffman, Determining strengths for public keys used for exchanging symmetric keys, RFC 3766, April 2004.
    • RFC 3766
    • Orman, H.1    Hoffman, P.2
  • 41
    • 84872100052 scopus 로고    scopus 로고
    • An introduction to OpenSSL programming
    • E. Rescorla An introduction to OpenSSL programming Linux J. 2001 89 2001 3
    • (2001) Linux J. , vol.2001 , Issue.89 , pp. 3
    • Rescorla, E.1
  • 45
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A.K. Lenstra, and E.R. Verheul Selecting cryptographic key sizes J. Cryptol. 14 1999 255 293
    • (1999) J. Cryptol. , vol.14 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 48
    • 33749984561 scopus 로고    scopus 로고
    • ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks
    • M. Conti, R. Di Pietro, and L.V. Mancini ECCE: enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks Ad Hoc Networks 5 1 2007 49 62
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 49-62
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.