Validating and Securing Spontaneous Associations between Wireless Devices

作者: Tim Kindberg , Kan Zhang

DOI: 10.1007/10958513_4

关键词: Wireless networkKey distribution in wireless sensor networksBody area networkWi-Fi arrayHeterogeneous networkMobile computingSpoofing attackComputer scienceComputer securityComputer networkWireless WAN

摘要: One of the sought-after characteristics mobile and ubiquitous computing environments is for devices to become spontaneously associated interoperate over wireless networks. However, unlike cable that connects two in a wired association, network does not provide physical indication which device on other end association. Further, messages sent are readily accessible same network. Hence, spontaneous association subject various spoofing replay attacks. We introduce protocols thwart these attacks by physically validating and, so doing, exchanging shared session key between them subsequent secure communication.

参考文章(16)
Jim Waldo, Ken Arnold, The Jini Specifications Addison-Wesley Longman Publishing Co., Inc.. ,(2000)
Diana K. Smetters, Paul Stewart, Dirk Balfanz, H. Chi Wong, Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. network and distributed system security symposium. ,(2002)
Tim Kindberg, Kan Zhang, Secure Spontaneous Device Association ubiquitous computing. pp. 124- 131 ,(2003) , 10.1007/978-3-540-39653-6_9
J. Veizades, E. Guttman, C. Perkins, M. Day, Service Location Protocol, Version 2 Service Location Protocol, Version 2. ,vol. 2608, pp. 1- 54 ,(1999)
J. Veizades, E. Guttman, C. Perkins, S. Kaplan, Service Location Protocol RFC. ,vol. 2165, pp. 1- 72 ,(1997)
Cliff Randell, Henk L. Muller, Low Cost Indoor Positioning System ubiquitous computing. pp. 42- 48 ,(2001) , 10.5555/647987.741343
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, Randy H. Katz, An architecture for a secure service discovery service acm/ieee international conference on mobile computing and networking. pp. 24- 35 ,(1999) , 10.1145/313451.313462
Nissanka B. Priyantha, Allen K.L. Miu, Hari Balakrishnan, Seth Teller, The cricket compass for context-aware mobile applications Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 1- 14 ,(2001) , 10.1145/381677.381679
L.M. Feeney, B. Ahlgren, A. Westerlund, Spontaneous networking: an application oriented approach to ad hoc networking IEEE Communications Magazine. ,vol. 39, pp. 176- 181 ,(2001) , 10.1109/35.925687
Frank Stajano, Ross Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks international workshop on security. pp. 172- 194 ,(1999) , 10.1007/10720107_24