A Mobile World of Security - The Model
2011 (English)In: IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), IEEE , 2011, 1-6 p.Conference paper (Refereed)
We propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Our approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Our basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known both to the users and the infrastructure. We can leverage this shared information to create shared secret keys, with little or no change of existing mobile communication systems. We show that we can achieve (almost passively) a rate of roughly 0.1 bits per second.
Place, publisher, year, edition, pages
IEEE , 2011. 1-6 p.
Analytical models, Base stations, Computational modeling, Entropy, Mobile communication, Protocols, Wireless communication
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-35541DOI: 10.1109/CISS.2011.5766242ScopusID: 2-s2.0-79957866256OAI: oai:DiVA.org:kth-35541DiVA: diva2:429046
45th Annual Conference on Information Sciences and Systems (CISS), 2011
FunderICT - The Next Generation
© 2011 IEEE. Personal use of the attached pdf is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 201202202011-07-082011-07-012012-06-13Bibliographically approved