The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2007 vol.6)
pp: 31-39
Ford Long Wong , University of Cambridge
Frank Stajano , University of Cambridge
Many security protocols were designed to run over inherently insecure channels such as ad hoc radio or the packet-switched Internet. However, they can be strengthened with additional transmissions over other lower-capacity channels, commonly found in ubicomp environments, that offer a different mix of security properties. A single protocol might exploit different channels for different messages in its trace. The authors demonstrate this point by presenting and discussing several security protocols for ubicomp pairing and group key agreement. This article is part of a special issue on security and privacy.
security protocols, key agreement, channels, authentication, commitment
Ford Long Wong, Frank Stajano, "Multichannel Security Protocols", IEEE Pervasive Computing, vol.6, no. 4, pp. 31-39, October-December 2007, doi:10.1109/MPRV.2007.76
1. F. Stajano and R. Anderson, "The Resurrecting Duckling—Security Issues for Ad Hoc Wireless Networks," Proc. Security Protocols Workshop, LNCS 1796, Springer, 1999, pp. 172–182.
2. F.-L. Wong and F. Stajano, "Multi-Channel Protocols," Proc. 13th Int'l Workshop Security Protocols, LNCS 4631, Springer, 2005.
3. M. Weiser, "Some Computer Science Issues in Ubiquitous Computing," Comm. ACM, vol. 36, no. 3, 1993, pp. 75–84.
4. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, 1976, pp. 644–654.
5. D. Dolev and A.C. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198–208.
6. S. Laur and K. Nyberg, "Efficient Mutual Data Authentication Using Manually Authenticated Strings," Proc. 5th Int'l Conf. Cryptology and Network Security (CANS 06), LNCS 4301, Springer, 2006, pp. 90–107.
28 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool