Get 20M+ Full-Text Papers For Less Than $1.50/day. Subscribe now for You or Your Team.

Learn More →

Integrity regions: authentication through presence in wireless networks

Integrity regions: authentication through presence in wireless networks Integrity Regions: Authentication Through Presence in Wireless Networks Srdjan Capkun — Department of Computer Science ETH Zurich 8092 Zurich, Switzerland Mario Cagalj — Faculty of Electrical Engineering, Mechanical Engineering, and Naval Architecture (FESB) University of Split 21000 Split, Croatia capkun@inf.ethz.ch ABSTRACT We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certi ed keys. Integrity regions are based on the veri cation of entity proximity through time-of-arrival ranging techniques. We demonstrate how I-regions can be e ƒciently implemented with ultrasonic ranging, in spite of the fact that ultrasound ranging techniques are vulnerable to distance enlargement and reduction attacks. We further discuss how I-regions can be used in key establishment applications in peer-to-peer wireless networks. mario.cagalj@fesb.hr introduced by the environmental conditions often makes the accurate estimation of the full extent of a radio range di ƒcult if not impossible [27]. In an adversarial setting, this means that users can hardly predict the maximal distance from which an adversary can eavesdrop on their communication. Furthermore, adversary ™s receiver sensitivity and antenna gain can be much higher than the ones of the users; in this way, he/she can eavesdrop http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Integrity regions: authentication through presence in wireless networks

Association for Computing Machinery — Sep 28, 2006

Loading next page...
/lp/association-for-computing-machinery/integrity-regions-authentication-through-presence-in-wireless-networks-DBsqOlr29B

References (65)

Datasource
Association for Computing Machinery
Copyright
Copyright © 2006 by ACM Inc.
ISBN
1-59593-557-6
doi
10.1145/1161289.1161291
Publisher site
See Article on Publisher Site

Abstract

Integrity Regions: Authentication Through Presence in Wireless Networks Srdjan Capkun — Department of Computer Science ETH Zurich 8092 Zurich, Switzerland Mario Cagalj — Faculty of Electrical Engineering, Mechanical Engineering, and Naval Architecture (FESB) University of Split 21000 Split, Croatia capkun@inf.ethz.ch ABSTRACT We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certi ed keys. Integrity regions are based on the veri cation of entity proximity through time-of-arrival ranging techniques. We demonstrate how I-regions can be e ƒciently implemented with ultrasonic ranging, in spite of the fact that ultrasound ranging techniques are vulnerable to distance enlargement and reduction attacks. We further discuss how I-regions can be used in key establishment applications in peer-to-peer wireless networks. mario.cagalj@fesb.hr introduced by the environmental conditions often makes the accurate estimation of the full extent of a radio range di ƒcult if not impossible [27]. In an adversarial setting, this means that users can hardly predict the maximal distance from which an adversary can eavesdrop on their communication. Furthermore, adversary ™s receiver sensitivity and antenna gain can be much higher than the ones of the users; in this way, he/she can eavesdrop

There are no references for this article.