Key agreement in peer-to-peer wireless networks

被引:74
作者
Cagalj, M [1 ]
Capkun, S
Hubaux, JP
机构
[1] Tech Univ Denmark, IMM, DK-2800 Lyngby, Denmark
[2] Ecole Polytech Fed Lausanne, LCA, CH-1015 Lausanne, Switzerland
[3] Univ Calif Los Angeles, NESL, Los Angeles, CA USA
关键词
Diffie-Hellman (DH) protocol; key agreement protocols; man-in-the-middle (MITM) attacks; message authenticators; security; wireless networks;
D O I
10.1109/JPROC.2005.862475
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a set of simple techniques for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol, which is known to be vulnerable to the "man-in-the-middle" attack if the two users involved in the protocol do not share any authenticated information about each other (e.g., public keys, certificates, passwords, shared keys, etc.) prior to the protocol execution. In this paper, we solve the problem by leveraging on the natural ability of users to authenticate each other by visual and verbal contact. We propose three techniques. The first is based on visual comparison of short strings, the second on distance bounding, and the third on integrity codes; in each case. the users do not need to enter any password or other data, nor do they need physical or infrared connectivity between their devices. We base our analysis on a well-established methodology that leads us to a rigorous modularization and a thorough robustness proof of our proposal.
引用
收藏
页码:467 / 478
页数:12
相关论文
共 31 条
[1]  
AIELLO W, 2000, P ACM COMPUTER COMM, P48
[2]  
[Anonymous], 802111999 IEEE
[3]  
[Anonymous], 1998, RFC2409
[4]  
[Anonymous], 2001, Specification of the Bluetooth System
[5]  
[Anonymous], 2004, RSA Cryptobytes
[6]   Key agreement in ad hoc networks [J].
Asokan, N ;
Ginzboorg, P .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1627-1637
[7]  
BALFANZ D, P 9 ANN NETW DISTR S
[8]  
Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
[9]  
BELLARE M, P 30 ANN S THEOR COM, P419
[10]  
Brands Stefan, 1993, Proceedings of EUROCRYPT, P344, DOI DOI 10.1007/3-540-48285-7_30