[go: up one dir, main page]

Čapkun et al., 2006 - Google Patents

Integrity regions: authentication through presence in wireless networks

Čapkun et al., 2006

Document ID
6314267674379130407
Author
Čapkun S
Čagalj M
Publication year
Publication venue
Proceedings of the 5th ACM workshop on Wireless security

External Links

Snippet

We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. Integrity regions are based on the verification of entity proximity through time-of-arrival …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
Čapkun et al. Integrity regions: authentication through presence in wireless networks
Cagalj et al. Key agreement in peer-to-peer wireless networks
US8156337B2 (en) Systems and methods for authenticating communications in a network medium
US20230155816A1 (en) Internet of things security with multi-party computation (mpc)
Boyle et al. Securing Wireless Sensor Networks: Security Architectures.
US7987363B2 (en) Secure wireless communications system and related method
Siddhartha et al. A lightweight authentication protocol using implicit certificates for securing IoT systems
Čapkun et al. Integrity codes: Message integrity protection and authentication over insecure channels
Cagalj et al. Integrity (I) codes: Message integrity protection and authentication over insecure channels
Liu et al. Cryptanalysis of a SIP authentication scheme
Wong et al. Repairing the Bluetooth pairing protocol
Wang et al. Secure Enhanced IoT-WLAN Authentication Protocol With Efficient Fast Reconnection
Haataja New efficient intrusion detection and prevention system for Bluetooth networks.
Zhang et al. FKR: An efficient authentication scheme for IEEE 802.11 ah networks
Martucci et al. A lightweight distributed group authentication mechanism
Krasnowski et al. Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication.
Claycomb et al. Secure device pairing using audio
Abi-Char et al. A secure and lightweight authenticated key agreement protocol for distributed IoT applications
Kwon et al. Provably-secure two-round password-authenticated group key exchange in the standard model
Thite et al. SecureAuthKey: design and evaluation of a lightweight key agreement technique for smart home applications
Berchtold et al. Secure communication protocol for a low-bandwidth audio channel
Safdar et al. Prevention against threats to self co-existence-a novel authentication protocol for cognitive radio networks
Wong Protocols and technologies for security in pervasive computing and communications
Lu et al. An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Tippenhauer Integrity Regions: Authentication Through Presence in Wireless Networks