TY - GEN
T1 - How to bootstrap security for ad-hoc network
T2 - 24th IFIP TC11 International Information Security Conference, SEC 2009
AU - Shin, Wook
AU - Gunter, Carl A.
AU - Kiyomoto, Shinsaku
AU - Fukushima, Kazuhide
AU - Tanaka, Toshiaki
PY - 2009
Y1 - 2009
N2 - There are various network-enabled and embedded computers deployed around us. Although we can get enormous conveniences by connecting them together, it is difficult to securely associate them in an ad-hoc manner. The difficulties originate from authentication and key distribution problems among devices that are strangers to each other. In this paper, we review the existing ways of initiating secure communication for ad-hoc network devices, and propose another solution. Exploiting Pairing-based cryptography and the notion of location-limited channel, the proposed solution bootstraps security conveniently and efficiently. Further, it supports ownership enforcement and key-escrow.
AB - There are various network-enabled and embedded computers deployed around us. Although we can get enormous conveniences by connecting them together, it is difficult to securely associate them in an ad-hoc manner. The difficulties originate from authentication and key distribution problems among devices that are strangers to each other. In this paper, we review the existing ways of initiating secure communication for ad-hoc network devices, and propose another solution. Exploiting Pairing-based cryptography and the notion of location-limited channel, the proposed solution bootstraps security conveniently and efficiently. Further, it supports ownership enforcement and key-escrow.
UR - http://www.scopus.com/inward/record.url?scp=79952915345&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952915345&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-01244-0_11
DO - 10.1007/978-3-642-01244-0_11
M3 - Conference contribution
AN - SCOPUS:79952915345
SN - 9783642012433
T3 - IFIP Advances in Information and Communication Technology
SP - 119
EP - 131
BT - Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings
A2 - Gritzalis, Dimitris
A2 - Lopez, Javier
PB - Springer
Y2 - 18 May 2009 through 20 May 2009
ER -