Napredna pretraga

Pregled bibliografske jedinice broj: 497757

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

Perković, Toni; Čagalj, Mario; Mastelić, Toni; Saxena, Nitesh; Begušić, Dinko
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User // IEEE transactions on mobile computing, 11 (2012), 2; 337-351 doi:10.1109/TMC.2011.35 (međunarodna recenzija, članak, znanstveni)

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

Perković, Toni ; Čagalj, Mario ; Mastelić, Toni ; Saxena, Nitesh ; Begušić, Dinko

IEEE transactions on mobile computing (1536-1233) 11 (2012), 2; 337-351

Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni

Ključne riječi
Message authentication protocol; Out-of-Band Communication; Usable security; Wireless networks

A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device (such as a programmable camera, computer or Faraday cage). In this paper, we design a solution that allows a user unaided initialization (free from auxiliary devices) of a relatively large number of wireless devices. The proposed solution is based on a novel multichannel Group message Authentication Protocol (GAP), in which information is transmitted over both a radio and a visible light channel (VLC). A notable feature of GAP is that the information to be authenticated is independent of the short authentication string to be verified by the user (an indirect binding protocol [28]). This, as we show, results in a lower communication cost compared to existing direct binding protocols. The advantage in terms of the communication cost of our GAP protocol is especially important for power-constrained devices, such as wireless sensor motes. Another appealing feature of GAP is that it is secure in the attacker model where the VLC is semiauthentic ; whereas existing protocols consider VLC to be authentic. This is made possible by using joint Manchester-Berger unidirectional error-detection codes that are secure and easy to interpret by a non-specialist and unaided end user. Our overall key deployment mechanism has minimal hardware requirements: one LED, one button and, of course, a radio transceiver, and is thus suitable for initializing devices with constrained interfaces, such as (multiple) wireless sensor motes. We demonstrate the feasibility of the proposed method via a preliminary usability study. The study indicates that the method has reasonably low execution time, minimal error rate and is user-friendly.

Izvorni jezik

Znanstvena područja
Elektrotehnika, Računarstvo


Projekt / tema
023-0231924-1660 - NAPREDNE HETEROGENE MREŽNE TEHNOLOGIJE (Dinko Begušić, )

Fakultet elektrotehnike, strojarstva i brodogradnje, Split

Časopis indeksira:

  • Current Contents Connect (CCC)
  • Web of Science Core Collection (WoSCC)
    • Science Citation Index Expanded (SCI-EXP)
    • SCI-EXP, SSCI i/ili A&HCI
  • Scopus