Multi-channel protocols

8Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encoded information to a camera. Additional channels may have limited capacity and may still be subject to eavesdropping, but they may offer specific advantages over radio such as data origin authenticity. A single protocol may profitably use more than one channel, each with its own specific security properties, for different messages in its trace. Making this option explicit allows for further advances in protocol design. We also present an intriguing asymmetric protocol that achieves results comparable to mutual authentication even though the verification happens only in one direction. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Wong, F. L., & Stajano, F. (2007). Multi-channel protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4631 LNCS, pp. 112–127). Springer Verlag. https://doi.org/10.1007/978-3-540-77156-2_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free