Abstract
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For
spontaneous interaction between independent, mobile devices, no a priori information is available for authentication purposes. However, traditional approaches based on manual password input or verification of key fingerprints do not scale to tens to hundreds of interactions a day, as envisioned by future ubiquitous computing environments.
One possibility to solve this problem is authentication based on similar sensor data: when two (or multiple) devices are in the same
situation, and thus experience the same sensor readings, this constitutes shared, (weakly) secret information. This paper introduces the Candidate Key Protocol (CKP) to interactively generate secret shared keys from similar sensor data streams. It is suitable for two-party and multi-party authentication, and supports opportunistic authentication.
Original language | English |
---|---|
Title of host publication | Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Proceedings |
Pages | 1-15 |
Number of pages | 15 |
DOIs | |
Publication status | Published - 2007 |
Event | ESAS 2007 - Cambridge, United Kingdom Duration: 2 Jul 2007 → 3 Jul 2007 http://www.cl.cam.ac.uk/~twm29/esas |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 4572 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | ESAS 2007 |
---|---|
Country/Territory | United Kingdom |
City | Cambridge |
Period | 02.07.2007 → 03.07.2007 |
Internet address |
Keywords
- Context authentication
- Cryptographic hash
- Sensor data