Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2851))
Included in the following conference series:
768Accesses
Abstract
One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the other end of the association. Further, the messages sent over a wireless network are readily accessible to other devices on the same network. Hence, a spontaneous wireless association is subject to various spoofing and replay attacks. We introduce protocols to thwart these attacks by physically validating the two devices in a wireless association and, in so doing, exchanging a shared session key between them for subsequent secure communication.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Czerwinski, S., Zhao, B., Hodes, T., Joseph, A., Katz, R.: An Architecture for a Secure Service Discovery Service. In: Proc. fifth annual ACM/IEEE international conference on Mo-bile computing and networking, pp. 24–35 (1999)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols. 7th International Workshop Proceedings. LNCS. Springer, Heidelberg (1999)
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.W.: Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Feeney, L.M., Ahlgren, B., Westerlund, A.: Spontaneous Networking: An Application-oriented Approach to Ad Hoc Networking. IEEE Communications Magazine 39(6) (June 2001)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium, San Diego, CA, USA, February 6-8 (2002)
Shared Wireless Access Protocol (Cordless Access) Specification (SWAP-CA), Revision 1.0, The HomeRF Technical Committee, December 17 (1998)
Iwasaki, Y., Kawaguchi, N., Inagaki, Y.: Touch-and-Connect: A Connection Request Framework for Ad-hoc Networks and the Pervasive Computing Environment. In: Proc. IEEE PerCom, pp. 20–29 (2003)
Addlesee, M., Curwen, R., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a sentient computing system. IEEE Computer 34(8), 50–56 (2001)
Priyantha, N.B., Miu, A., Balakrishnan, H., Teller, S.: The Cricket Compass for Con-text-Aware Mobile Applications. In: Proc. 7th ACM MOBICOM, Rome, Italy (July 2001)
Randell, C., Muller, H.: Low Cost Indoor Positioning System. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 42–48. Springer, Heidelberg (2001)
Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA) (June 2002)
Schneier, B.: Applied Cryptography. John Wiley & Sons, Inc., Chichester (1994)
Hazas, M., Ward, A.: A Novel Broadband Ultrasonic Location System. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 264–280. Springer, Heidelberg (2002)
Kindberg, T., Zhang, K.: Secure Spontaneous Device Association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 124–131. Springer, Heidelberg (2003) (to appear)
Author information
Authors and Affiliations
Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA, 94304, USA
Tim Kindberg & Kan Zhang
- Tim Kindberg
You can also search for this author inPubMed Google Scholar
- Kan Zhang
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Information Security Institute, Queensland University of Technology, GPO Box 2434, Qld 4001, Brisbane, Australia
Colin Boyd
Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, BS34 8QZ, Bristol, UK
Wenbo Mao
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kindberg, T., Zhang, K. (2003). Validating and Securing Spontaneous Associations between Wireless Devices. In: Boyd, C., Mao, W. (eds) Information Security. ISC 2003. Lecture Notes in Computer Science, vol 2851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10958513_4
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-20176-2
Online ISBN:978-3-540-39981-0
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative