Sciweavers

Share
TMC
2012

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

7 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device (such as a programmable camera, computer or Faraday cage). In this paper, we design a solution that allows a user unaided initialization (free from auxiliary devices) of a relatively large number of wireless devices. The proposed solution is based on a novel multichannel Group message Authentication Protocol (GAP), in which information is transmitted over both a radio and a visible light channel (VLC). A notable feature of GAP is that the information to be authenticated is independent of the short authentication string to be verified by the user (an indirect binding protocol [28]). This, as we show, results in a lower communication cost compared to existing direct binding protocols. The advantage in terms o...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh
Added 29 Sep 2012
Updated 29 Sep 2012
Type Journal
Year 2012
Where TMC
Authors Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh Saxena, Dinko Begusic
Comments (0)
books