Research Article
Key Establishment Using Secure Distance Bounding Protocols
@INPROCEEDINGS{10.1109/MOBIQ.2007.4451066, author={Dave Singelee and Bart Preneel}, title={Key Establishment Using Secure Distance Bounding Protocols}, proceedings={1st International ICST Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems}, publisher={IEEE}, proceedings_a={SPEUCS}, year={2008}, month={2}, keywords={Ad hoc networks Authentication Bandwidth Batteries Communication system security Cryptographic protocols Digital signatures Public key Public key cryptography Wireless personal area networks}, doi={10.1109/MOBIQ.2007.4451066} }
- Dave Singelee
Bart Preneel
Year: 2008
Key Establishment Using Secure Distance Bounding Protocols
SPEUCS
IEEE
DOI: 10.1109/MOBIQ.2007.4451066
Abstract
Key establishment is one of the major challenges in wireless personal area networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wireless ad-hoc networks. In this paper, we present an efficient key establishment protocol, based on the basic Diffie-Hellman protocol. It enables mutual device authentication through presence and establishes a session key between personal mobile devices which do not yet share any authenticated cryptographic material. Distance bounding protocols, which have been introduced by Brands and Chaum at Eurocrypt'93 to preclude distance fraud and mafia fraud attacks, are employed to determine an upper- bound on the distance to another entity. Our solution only requires limited user-interaction: the user of a mobile device is expected to perform a visual verification within a small physical space.