Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 497757

Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User


Perković, Toni; Čagalj, Mario; Mastelić, Toni; Saxena, Nitesh; Begušić, Dinko
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User // IEEE transactions on mobile computing, 11 (2012), 2; 337-351 doi:10.1109/TMC.2011.35 (međunarodna recenzija, članak, znanstveni)


CROSBI ID: 497757 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

Autori
Perković, Toni ; Čagalj, Mario ; Mastelić, Toni ; Saxena, Nitesh ; Begušić, Dinko

Izvornik
IEEE transactions on mobile computing (1536-1233) 11 (2012), 2; 337-351

Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni

Ključne riječi
Message authentication protocol ; Out-of-Band Communication ; Usable security ; Wireless networks

Sažetak
A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device (such as a programmable camera, computer or Faraday cage). In this paper, we design a solution that allows a user unaided initialization (free from auxiliary devices) of a relatively large number of wireless devices. The proposed solution is based on a novel multichannel Group message Authentication Protocol (GAP), in which information is transmitted over both a radio and a visible light channel (VLC). A notable feature of GAP is that the information to be authenticated is independent of the short authentication string to be verified by the user (an indirect binding protocol [28]). This, as we show, results in a lower communication cost compared to existing direct binding protocols. The advantage in terms of the communication cost of our GAP protocol is especially important for power- constrained devices, such as wireless sensor motes. Another appealing feature of GAP is that it is secure in the attacker model where the VLC is semiauthentic ; whereas existing protocols consider VLC to be authentic. This is made possible by using joint Manchester-Berger unidirectional error-detection codes that are secure and easy to interpret by a non- specialist and unaided end user. Our overall key deployment mechanism has minimal hardware requirements: one LED, one button and, of course, a radio transceiver, and is thus suitable for initializing devices with constrained interfaces, such as (multiple) wireless sensor motes. We demonstrate the feasibility of the proposed method via a preliminary usability study. The study indicates that the method has reasonably low execution time, minimal error rate and is user- friendly.

Izvorni jezik
Engleski

Znanstvena područja
Elektrotehnika, Računarstvo



POVEZANOST RADA


Projekti:
023-0231924-1660 - NAPREDNE HETEROGENE MREŽNE TEHNOLOGIJE (Begušić, Dinko, MZOS ) ( CroRIS)

Ustanove:
Fakultet elektrotehnike, strojarstva i brodogradnje, Split

Profili:

Avatar Url Dinko Begušić (autor)

Avatar Url Toni Mastelić (autor)

Avatar Url Toni Perković (autor)

Avatar Url Mario Čagalj (autor)

Poveznice na cjeloviti tekst rada:

doi www.computer.org www.fesb.hr ieeexplore.ieee.org

Citiraj ovu publikaciju:

Perković, Toni; Čagalj, Mario; Mastelić, Toni; Saxena, Nitesh; Begušić, Dinko
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User // IEEE transactions on mobile computing, 11 (2012), 2; 337-351 doi:10.1109/TMC.2011.35 (međunarodna recenzija, članak, znanstveni)
Perković, T., Čagalj, M., Mastelić, T., Saxena, N. & Begušić, D. (2012) Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User. IEEE transactions on mobile computing, 11 (2), 337-351 doi:10.1109/TMC.2011.35.
@article{article, author = {Perkovi\'{c}, Toni and \v{C}agalj, Mario and Masteli\'{c}, Toni and Saxena, Nitesh and Begu\v{s}i\'{c}, Dinko}, year = {2012}, pages = {337-351}, DOI = {10.1109/TMC.2011.35}, keywords = {Message authentication protocol, Out-of-Band Communication, Usable security, Wireless networks}, journal = {IEEE transactions on mobile computing}, doi = {10.1109/TMC.2011.35}, volume = {11}, number = {2}, issn = {1536-1233}, title = {Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User}, keyword = {Message authentication protocol, Out-of-Band Communication, Usable security, Wireless networks} }
@article{article, author = {Perkovi\'{c}, Toni and \v{C}agalj, Mario and Masteli\'{c}, Toni and Saxena, Nitesh and Begu\v{s}i\'{c}, Dinko}, year = {2012}, pages = {337-351}, DOI = {10.1109/TMC.2011.35}, keywords = {Message authentication protocol, Out-of-Band Communication, Usable security, Wireless networks}, journal = {IEEE transactions on mobile computing}, doi = {10.1109/TMC.2011.35}, volume = {11}, number = {2}, issn = {1536-1233}, title = {Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User}, keyword = {Message authentication protocol, Out-of-Band Communication, Usable security, Wireless networks} }

Časopis indeksira:


  • Current Contents Connect (CCC)
  • Web of Science Core Collection (WoSCC)
    • Science Citation Index Expanded (SCI-EXP)
    • SCI-EXP, SSCI i/ili A&HCI
  • Scopus


Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font