Change search
ReferencesLink to record
Permanent link

Direct link
A Mobile World of Security - The Model
KTH, School of Electrical Engineering (EES), Communication Networks.
2011 (English)In: IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), IEEE , 2011, 1-6 p.Conference paper (Refereed)
Abstract [en]

We propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Our approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Our basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known both to the users and the infrastructure. We can leverage this shared information to create shared secret keys, with little or no change of existing mobile communication systems. We show that we can achieve (almost passively) a rate of roughly 0.1 bits per second.

Place, publisher, year, edition, pages
IEEE , 2011. 1-6 p.
Keyword [en]
Analytical models, Base stations, Computational modeling, Entropy, Mobile communication, Protocols, Wireless communication
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
URN: urn:nbn:se:kth:diva-35541DOI: 10.1109/CISS.2011.5766242ScopusID: 2-s2.0-79957866256OAI: diva2:429046
45th Annual Conference on Information Sciences and Systems (CISS), 2011
ICT - The Next Generation
© 2011 IEEE. Personal use of the attached pdf is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20120220Available from: 2011-07-08 Created: 2011-07-01 Last updated: 2012-06-13Bibliographically approved

Open Access in DiVA

fulltext(208 kB)126 downloads
File information
File name FULLTEXT01.pdfFile size 208 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusIEEEXplore

Search in DiVA

By author/editor
Papadimitratos, Panagiotis
By organisation
Communication Networks
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 126 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 55 hits
ReferencesLink to record
Permanent link

Direct link