Abstract
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encoded information to a camera. Additional channels may have limited capacity and may still be subject to eavesdropping, but they may offer specific advantages over radio such as data origin authenticity. A single protocol may profitably use more than one channel, each with its own specific security properties, for different messages in its trace. Making this option explicit allows for further advances in protocol design. We also present an intriguing asymmetric protocol that achieves results comparable to mutual authentication even though the verification happens only in one direction. © Springer-Verlag Berlin Heidelberg 2007.
Cite
CITATION STYLE
Wong, F. L., & Stajano, F. (2007). Multi-channel protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4631 LNCS, pp. 112–127). Springer Verlag. https://doi.org/10.1007/978-3-540-77156-2_14
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.