Pierson et al., 2016 - Google Patents
Wanda: securely introducing mobile devices (Extended version)Pierson et al., 2016
View PDF- Document ID
- 10129648920638337269
- Author
- Pierson T
- Liang X
- Peterson R
- Kotz D
- Publication year
External Links
Snippet
Nearly every setting is increasingly populated with wireless and mobile devices--whether appliances in a home, medical devices in a health clinic, sensors in an industrial setting, or devices in an office or school. There are three fundamental operations when bringing a new …
- 230000036541 health 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/04—Key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
- H04W76/02—Connection set-up
- H04W76/023—Direct mode set-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/008—Mobile application services or facilities specially adapted for wireless communication networks using short range communication, e.g. NFC, RFID or PAN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/16—Interfaces between hierarchically similar devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W36/00—Hand-off or reselection arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pierson et al. | Wanda: securely introducing mobile devices | |
| US11683071B2 (en) | Apparatus for securely configuring a target device | |
| EP2807498B1 (en) | Method, apparatus, and computer program product for short-range communication based direction finding | |
| Cai et al. | Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. | |
| Shi et al. | MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks | |
| Premnath et al. | Secret key extraction using Bluetooth wireless signal strength measurements | |
| Javali et al. | SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks | |
| Kuo et al. | Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes | |
| Zenger et al. | Authenticated key establishment for low-resource devices exploiting correlated random channels | |
| US20080298587A1 (en) | Apparatus and method for secure, user-friendly deployment of information | |
| Li et al. | Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications | |
| KR102048013B1 (en) | Network apparatus for pairing with user device and pairing method thereof | |
| CN103987044A (en) | A Body Area Network Node Authentication Mechanism Based on Poor Received Signal Strength | |
| Ghose et al. | SFIRE: Secret-free-in-band trust establishment for COTS wireless devices | |
| CN105187203B (en) | Shared key method for building up based on received signal strength between a kind of wireless device | |
| Scannell et al. | Proximity-based authentication of mobile devices | |
| Pierson et al. | Closetalker: Secure, short-range ad hoc wireless communication | |
| Pierson et al. | Wanda: securely introducing mobile devices (Extended version) | |
| Kennedy et al. | A review of WPAN security: attacks and prevention | |
| Kovačević et al. | Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices | |
| Krentz et al. | 6doku: Towards secure over-the-air preloading of 6lowpan nodes using phy key generation | |
| Mutchukota et al. | Man-in-the-middle attack and its countermeasure in bluetooth secure simple pairing | |
| Choi et al. | Push your password: Secure and fast wifi connection for iot devices | |
| Engstrand et al. | Security and privacy for fat intra-body communication: Mechanisms and protocol stack | |
| Wang et al. | WAVE: Secure wireless pairing exploiting human body movements |