A Wireless Security Framework without Shared Secrets

نویسندگان

  • Lifeng Sang
  • Anish Arora
چکیده

This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non-repudiation and anonymity. Our framework is based on two physical primitives: collaborative jamming and spatial signature enforcement. Notably, it eschews the use of shared secrets, while providing a cryptosystem that is no less secure than conventional cryptosystems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets

Many peer-to-peer security protocols in mobile communications utilise shared secrets. Synchronous storage of shared secrets is imperative for the successful operation of security protocols, as asynchronous storage of shared secrets may lead to service unavailability. Hence, update mechanisms must not only guarantee the secrecy of shared secrets, but also their synchrony. This paper addresses sy...

متن کامل

Cross-layer Soft Security Framework for Wireless Embedded Systems

Robust methods for security are paramount in wireless embedded systems due to the inherent vulnerability of the underlying shared medium and the lack of any monitoring infrastructure. To guarantee security and reliability, most of the existing schemes perform periodic reestablishment of authentication credentials and share secrets among various participating nodes. However, the existing approac...

متن کامل

A Novel Proactive Multi-secret Sharing Scheme

A proactive secret sharing scheme is a method of sharing a secret among a set of participants. And, the corresponding shadows can be periodically renewed under the premise of never changing the shared secret. However, in the most existing proactive secret sharing schemes, only one secret can be shared during one secret sharing process. The proposed scheme describes PMSS, a new way to share mult...

متن کامل

Polygraphing Processes: N-Variant System Structures for Secretless Security

We describe a technique for hardening services that may contain unknown security vulnerabilities. We employ artificial diversity techniques, but in contrast to previous approaches that rely on keeping secrets to provide probabilistic security properties, we develop an architectural framework that provides a high degree of assurance without needing any secrets. The framework requires an attacker...

متن کامل

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications

Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009