[go: up one dir, main page]

Pierson et al., 2016 - Google Patents

Wanda: securely introducing mobile devices (Extended version)

Pierson et al., 2016

View PDF
Document ID
10129648920638337269
Author
Pierson T
Liang X
Peterson R
Kotz D
Publication year

External Links

Snippet

Nearly every setting is increasingly populated with wireless and mobile devices--whether appliances in a home, medical devices in a health clinic, sensors in an industrial setting, or devices in an office or school. There are three fundamental operations when bringing a new …
Continue reading at digitalcommons.dartmouth.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/04Key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • H04W76/02Connection set-up
    • H04W76/023Direct mode set-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/008Mobile application services or facilities specially adapted for wireless communication networks using short range communication, e.g. NFC, RFID or PAN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W36/00Hand-off or reselection arrangements

Similar Documents

Publication Publication Date Title
Pierson et al. Wanda: securely introducing mobile devices
US11683071B2 (en) Apparatus for securely configuring a target device
EP2807498B1 (en) Method, apparatus, and computer program product for short-range communication based direction finding
Cai et al. Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas.
Shi et al. MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
Premnath et al. Secret key extraction using Bluetooth wireless signal strength measurements
Javali et al. SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks
Kuo et al. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes
Zenger et al. Authenticated key establishment for low-resource devices exploiting correlated random channels
US20080298587A1 (en) Apparatus and method for secure, user-friendly deployment of information
Li et al. Security analysis of triangle channel-based physical layer key generation in wireless backscatter communications
KR102048013B1 (en) Network apparatus for pairing with user device and pairing method thereof
CN103987044A (en) A Body Area Network Node Authentication Mechanism Based on Poor Received Signal Strength
Ghose et al. SFIRE: Secret-free-in-band trust establishment for COTS wireless devices
CN105187203B (en) Shared key method for building up based on received signal strength between a kind of wireless device
Scannell et al. Proximity-based authentication of mobile devices
Pierson et al. Closetalker: Secure, short-range ad hoc wireless communication
Pierson et al. Wanda: securely introducing mobile devices (Extended version)
Kennedy et al. A review of WPAN security: attacks and prevention
Kovačević et al. Flashing displays: user‐friendly solution for bootstrapping secure associations between multiple constrained wireless devices
Krentz et al. 6doku: Towards secure over-the-air preloading of 6lowpan nodes using phy key generation
Mutchukota et al. Man-in-the-middle attack and its countermeasure in bluetooth secure simple pairing
Choi et al. Push your password: Secure and fast wifi connection for iot devices
Engstrand et al. Security and privacy for fat intra-body communication: Mechanisms and protocol stack
Wang et al. WAVE: Secure wireless pairing exploiting human body movements