Evidently secure device associations

A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only means of identifying the target device is physical. This paper contributes protocols for validating secure spontaneous associations. The protocols complement existing unauthenticated key-exchange protocols and work over widely used wireless technologies. They improve on previous work by eliminating specialised hardware. We present the protocols and discuss their advantages and limitations.

[1]  Tim Kindberg,et al.  Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Tim Kindberg,et al.  Secure Spontaneous Device Association , 2003, UbiComp.

[3]  Yasuyoshi Inagaki,et al.  Touch-and-connect: a connection request framework for ad-hoc networks and the pervasive computing environment , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[4]  Gaetano Borriello,et al.  Facile: a framework for attention-correlated local communication , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[6]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[7]  Bengt Ahlgren,et al.  Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[10]  Tim Kindberg,et al.  Validating and Securing Spontaneous Associations between Wireless Devices , 2003, ISC.

[11]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[12]  Adi Shamir,et al.  How to expose an eavesdropper , 1984, CACM.