This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Multichannel Security Protocols
October-December 2007 (vol. 6 no. 4)
pp. 31-39
Ford Long Wong, University of Cambridge
Frank Stajano, University of Cambridge
Many security protocols were designed to run over inherently insecure channels such as ad hoc radio or the packet-switched Internet. However, they can be strengthened with additional transmissions over other lower-capacity channels, commonly found in ubicomp environments, that offer a different mix of security properties. A single protocol might exploit different channels for different messages in its trace. The authors demonstrate this point by presenting and discussing several security protocols for ubicomp pairing and group key agreement. This article is part of a special issue on security and privacy.

1. F. Stajano and R. Anderson, "The Resurrecting Duckling—Security Issues for Ad Hoc Wireless Networks," Proc. Security Protocols Workshop, LNCS 1796, Springer, 1999, pp. 172–182.
2. F.-L. Wong and F. Stajano, "Multi-Channel Protocols," Proc. 13th Int'l Workshop Security Protocols, LNCS 4631, Springer, 2005.
3. M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Comm. ACM, vol. 36, no. 3, 1993, pp. 75–84.
4. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, 1976, pp. 644–654.
5. D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198–208.
6. S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90–107.
1. D. Balfanz et al., "Talking to Strangers: Authentication in Ad Hoc Wireless Networks," Proc. Network and Distributed System Security Symp., Internet Soc., 2002.
2. J.-H. Hoepman, "The Ephemeral Pairing Problem," Proc. Financial Cryptography, LNCS 3110, Springer, 2004, pp. 212–226.
3. J.M. McCune, A. Perrig, and M.K. Reiter, Seeing Is Believing: Using Camera Phones for Human-Verifiable Authentication, tech. report CMU-CS-04-174, Computer Science Dept., Carnegie Mellon Univ., 2004.
4. S. Vaudenay, "Secure Communications over Insecure Channels Based on Short Authenticated Strings," Proc. 25th Ann. Int'l Cryptology Conf. (CRYPTO 05), LNCS 3621, Springer, 2005, pp. 309–326.
5. M. Cagalj, S. Capkun, and J.P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," Proc. IEEE, vol. 94, no. 2, 2006, pp. 467–478.
6. S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90–107.
7. L.E. Holmquist et al., "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," Proc. 3rd Int'l Conf. Ubiquitous Computing (Ubicomp 01), LNCS 2201, Springer, 2001, pp. 116–122.
8. U. Maurer and P. Schmid, "A Calculus for Secure Channel Establishment in Open Networks," Proc. 3rd European Symp. Research in Computer Security (ESORICS94), LNCS 875, Springer, 1994, pp. 173–192.
9. S. Creese et al., "The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model," Proc. 1st Int'l Workshop Formal Aspects in Security and Trust (FAST 03), tech. report, Inst. of Informatics and Telematics—Italian Nat'l Research Council, 2003, pp. 83−97.
1. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, 1976, pp. 644–654.
2. M. Steiner, G. Tsudik, and M. Waidner, "Cliques: A New Approach to Group Key Agreement," Proc. 18th Int'l Conf. Distributed Computing Systems (ICDCS 98), IEEE CS Press, 1998, pp. 380–387.
3. O. Pereira and J.-J. Quisquater, "Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols," Proc. IEEE Computer Security Foundations Workshop (CSFW 17), IEEE CS Press, 2004, pp. 16–29.
4. D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198–208.
5. F.-L. Wong and F. Stajano, "Multi-Channel Protocols for Group Key Agreement in Arbitrary Topologies," Proc. 3rd IEEE Int'l Workshop Pervasive Computing and Communication Security (PerSec 06), IEEE Press, 2006.
6. L.H. Nguyen and A.W. Roscoe, "Efficient Group Authentication Protocols Based on Human Interaction," Proc. FCS-ARSPA, 2006, pp. 9–32.
7. J. Valkonen, N. Asokan, and K. Nyberg, "Ad Hoc Security Associations for Groups," Proc. 3rd European Workshop Security in Ad Hoc and Sensor Networks (ESAS 06), LNCS 4357, Springer, 2006, pp. 150–164.

Index Terms:
security protocols, key agreement, channels, authentication, commitment
Citation:
Ford Long Wong, Frank Stajano, "Multichannel Security Protocols," IEEE Pervasive Computing, vol. 6, no. 4, pp. 31-39, Oct.-Dec. 2007, doi:10.1109/MPRV.2007.76
Usage of this product signifies your acceptance of the Terms of Use.