About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

Key agreement in peer-to-peer wireless networks

From

System Security, Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Department of Informatics and Mathematical Modeling, Technical University of Denmark2

We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the “man-in-the-middle” attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords, shared keys, etc.) prior to the protocol execution.

In this paper, we solve the problem by leveraging on the natural ability of users to authenticate each other by visual and verbal contact.We propose three techniques: the first is based on visual comparison of short strings, the second on distance bounding, and the third on integrity codes; in each case, the users do not need to enter any password or other data, nor do they need physical or infrared connectivity between their devices.

We base our analysis on a well-established methodology that leads us to a rigorous modularization and a thorough robustness proof of our proposal.

Language: English
Publisher: IEEE
Year: 2006
Pages: 467-478
ISSN: 15582256 and 00189219
Types: Journal article
DOI: 10.1109/JPROC.2005.862475

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis