The Community for Technology Leaders
RSS Icon
Issue No.02 - February (2012 vol.11)
pp: 337-351
Toni Perković , FESB, University of Split, Split
Mario Čagalj , University of Split, Split
Toni Mastelić , FESB, University of Split, Split
Nitesh Saxena , Polytechnic Institute of New York University, Brooklyn
Dinko Begušić , FESB, University of Split, Split
Message authentication protocol, out-of-band communication, usable security, wireless networks.
Toni Perković, Mario Čagalj, Toni Mastelić, Nitesh Saxena, Dinko Begušić, "Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User", IEEE Transactions on Mobile Computing, vol.11, no. 2, pp. 337-351, February 2012, doi:10.1109/TMC.2011.35
[1] Mica2 Specifications, isa/internal/CrossBow/DataSheetsmica2.pdf , 2011.
[2] N. Kushalnagar et al., “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals,” IETF RFC 4919,, Mar. 2011.
[3] R. Anderson, H. Chan, and A. Perrig, “Key Infection: Smart Trust for Smart Dust,” Proc. IEEE Int'l Conf. Network Protocols, 2004.
[4] D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,” Proc. Symp. Network and Distributed Systems Security, 2002.
[5] M. Bellare and P. Rogaway, “Entity Authentication and Key Distribution,” Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '93), 1993.
[6] J.M. Berger, “A Note on an Error Detection Code for Asymmetric Channels,” Information and Control, vol. 4, pp. 68-73, 1961.
[7] J. Brooke, “SUS: A Quick and Dirty Usability Scale,” Usability Evaluation in Industry, Taylor and Francis, 1996.
[8] M. Cagalj, S. Capkun, and J.-P. Hubaux, “Key Agreement in Peer-to-Peer Wireless Networks,” Proc. IEEE, Special Issue on Cryptography and Security, vol. 94, no. 2, pp. 467-478, Feb. 2006.
[9] C. Castelluccia and P. Mutaf, “Shake Them Up!: A Movement-Based Pairing Protocol for CPU-Constrained Devices,” Proc. ACM MobiSys, 2005.
[10] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, 2003.
[11] C.-H. Owen Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J.M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, “GAnGS: Gather, Authenticate 'n Group Securely,” Proc. ACM MobiCom, 2008.
[12] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS '03), 2003.
[13] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS '02), 2002.
[14] L.E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.W. Gellersen, “Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts,” Proc. Third Int'l Conf. Ubiquitous Computing, 2001.
[15] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,” Proc. Second Int'l Conf. Embedded Networked Sensor Systems, 2004.
[16] A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, “Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,” Proc. Int'l Conf. Pervasive Computing and Comm. (PerCom '09), 2009.
[17] C. Kuo, M. Luk, R. Negi, and A. Perrig, “Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes,” Proc. Fifth Int'l Conf. Embedded Networked Sensor Systems (SenSys '07), 2007.
[18] S. Laur and S. Pasini, “SAS-Based Group Authentication and Key Agreement Protocols,” Proc. Practice and Theory in Public-Key Cryptography, 11th Int'l Conf. Public-Key Cryptography, 2008.
[19] S. Laur and S. Pasini, “User-Aided Data Authentication,” Int'l J. Security and Networks, vol. 4, pp. 69-86, 2009.
[20] Y.W. Law, G. Moniava, Z. Gong, P.H. Hartel, and M. Palaniswami, “KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks,” Technical Report TR-CTIT-08-67, 2008.
[21] J. Lester, B. Hannaford, and G. Borriello, “‘Are You with Me?’—Using Accelerometers to Determine if Two Devices Are Carried by the Same Person,” Proc. Second Int'l Conf. Pervasive Computing, 2004.
[22] M. Li, S. Yu, W. Lou, and K. Ren, “Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks,” Proc. IEEE INFOCOM, 2010.
[23] Y.-H. Lin, A. Studer, H.-C. Hsiao, J.M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, “SPATE: Small-Group PKI-Less Authenticated Trust Establishment,” Proc. ACM MobiSys, 2009.
[24] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS '03), 2003.
[25] R. Mayrhofer and H. Gellersen, “Shake Well before Use: Two Implementations for Implicit Context Authentication,” Proc. Int'l Conf. Ubiquitous Computing (Ubicomp '07), 2007.
[26] R. Mayrhofer and M. Welch, “A Human-Verifiable Authentication Protocol Using Visible Laser Light,” Proc. Int'l Conf. Availability, Reliability and Security, 2007.
[27] J.M. McCune, A. Perrig, and M.K. Reiter, “Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication,” Proc. IEEE Symp. Security and Privacy, 2005.
[28] L.H. Nguyen and A.W. Roscoe, “Authentication Protocols Based on Low-Bandwidth Unspoofable Channels: A Comparative Survey,” J. Computer Security, vol. 19, pp. 139-201, 2011.
[29] R. Nithyanand, N. Saxena, G. Tsudik, and E. Uzun, “Groupthink: Usability of Secure Group Association for Wireless Devices,” Proc. 12th ACM Int'l Conf. Ubiquitous Computing, 2010.
[30] T. Perkovic, I. Stancic, L. Malisa, and M. Cagalj, “Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks,” Proc. Fifth Int'l Conf. Security and Privacy in Comm. Networks (Securecomm '09), 2009.
[31] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
[32] R. Prasad and N. Saxena, “Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns,” Proc. Int'l Conf. Applied Cryptography and Network Security, 2008.
[33] R. Roman and J. Lopez, “KeyLED—Transmitting Sensitive Data over Out-of-Band Channels in Wireless Sensor Networks,” Proc. Fourth IEEE Int'l Workshop Wireless and Sensor Networks Security (WSNS), 2008.
[34] P. Rost and G. Fettweis, “On the Transmission-Computation-Energy Tradeoff in Wireless and Fixed Networks,” Computing Research Repository,, 2010.
[35] N. Saxena and M.B. Uddin, “Automated Device Pairing for Asymmetric Pairing Scenarios,” Proc. 10th Int'l Conf. Information and Comm. Security, 2008.
[36] N. Saxena and M.B. Uddin, “Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes,” Proc. Eight Int'l Conf. Cryptology and Network Security (CANS '09), 2009.
[37] N. Saxena, M.B. Uddin, and J. Voris, “Universal Device Pairing Using an Auxiliary Device,” Proc. Fourth Symp. Usable Privacy and Security (SOUPS '08), 2008.
[38] C. Soriente, G. Tsudik, and E. Uzun, “HAPADEP: Human-Assisted Pure Audio Device Pairing,” Proc. 11th Int'l Conf. Information Security (ISC '08), 2008.
[39] F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” Proc. Seventh Int'l Workshop Security Protocols, 2000.
[40] S. Vaudenay, “Secure Communications over Insecure Channels Based on Short Authenticated Strings,” Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05), 2005.
[41] F.L. Wong and F. Stajano, “Multichannel Security Protocols,” IEEE Pervasive Computing, Special Issue on Security and Privacy, vol. 6, no. 4, pp. 31-39, Oct.-Dec. 2007.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool