Validating and securing spontaneous associations between wireless devices

36Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the sought-after characteristics of mobile and ubiquitous computing environments is for devices to become spontaneously associated and interoperate over wireless networks. However, unlike the cable that connects two devices in a wired association, a wireless network does not provide a physical indication of which device is on the other end of the association. Further, the messages sent over a wireless network are readily accessible to other devices on the same network. Hence, a spontaneous wireless association is subject to various spoofing and replay attacks. We introduce protocols to thwart these attacks by physically validating the two devices in a wireless association and, in so doing, exchanging a shared session key between them for subsequent secure communication. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Kindberg, T., & Zhang, K. (2003). Validating and securing spontaneous associations between wireless devices. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2851, 44–53. https://doi.org/10.1007/10958513_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free