The candidate key protocol for generating secret shared keys from similar sensor data streams

Rene Mayrhofer

Research output: Chapter in Book/Report/Conference proceedingsConference contribution

25 Citations (Scopus)

Abstract

Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independent, mobile devices, no a priori information is available for authentication purposes. However, traditional approaches based on manual password input or verification of key fingerprints do not scale to tens to hundreds of interactions a day, as envisioned by future ubiquitous computing environments. One possibility to solve this problem is authentication based on similar sensor data: when two (or multiple) devices are in the same situation, and thus experience the same sensor readings, this constitutes shared, (weakly) secret information. This paper introduces the Candidate Key Protocol (CKP) to interactively generate secret shared keys from similar sensor data streams. It is suitable for two-party and multi-party authentication, and supports opportunistic authentication.
Original languageEnglish
Title of host publicationSecurity and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Proceedings
Pages1-15
Number of pages15
DOIs
Publication statusPublished - 2007
EventESAS 2007 - Cambridge, United Kingdom
Duration: 2 Jul 20073 Jul 2007
http://www.cl.cam.ac.uk/~twm29/esas

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4572 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceESAS 2007
Country/TerritoryUnited Kingdom
CityCambridge
Period02.07.200703.07.2007
Internet address

Keywords

  • Context authentication
  • Cryptographic hash
  • Sensor data

Fingerprint

Dive into the research topics of 'The candidate key protocol for generating secret shared keys from similar sensor data streams'. Together they form a unique fingerprint.

Cite this