About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems

Research Article

Key Establishment Using Secure Distance Bounding Protocols

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451066,
        author={Dave  Singelee and Bart  Preneel},
        title={Key Establishment Using Secure Distance Bounding Protocols},
        proceedings={1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems},
        publisher={IEEE},
        proceedings_a={SPEUCS},
        year={2008},
        month={2},
        keywords={Ad hoc networks  Authentication  Bandwidth  Batteries  Communication system security  Cryptographic protocols  Digital signatures  Public key  Public key cryptography  Wireless personal area networks},
        doi={10.1109/MOBIQ.2007.4451066}
    }
    
  • Dave Singelee
    Bart Preneel
    Year: 2008
    Key Establishment Using Secure Distance Bounding Protocols
    SPEUCS
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451066
Dave Singelee1,*, Bart Preneel1,*
  • 1: ESAT-COSIC Katholieke Universiteit Leuven Belgium
*Contact email: Dave.Singelee@esat.kuleuven.be, Bart.Preneel@esat.kuleuven.be

Abstract

Key establishment is one of the major challenges in wireless personal area networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wireless ad-hoc networks. In this paper, we present an efficient key establishment protocol, based on the basic Diffie-Hellman protocol. It enables mutual device authentication through presence and establishes a session key between personal mobile devices which do not yet share any authenticated cryptographic material. Distance bounding protocols, which have been introduced by Brands and Chaum at Eurocrypt'93 to preclude distance fraud and mafia fraud attacks, are employed to determine an upper- bound on the distance to another entity. Our solution only requires limited user-interaction: the user of a mobile device is expected to perform a visual verification within a small physical space.

Keywords
Ad hoc networks Authentication Bandwidth Batteries Communication system security Cryptographic protocols Digital signatures Public key Public key cryptography Wireless personal area networks
Published
2008-02-12
Publisher
IEEE
Modified
2011-08-09
http://dx.doi.org/10.1109/MOBIQ.2007.4451066
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL