Security of Self-Organizing Networks 2010
DOI: 10.1201/ebk1439819197-3
|View full text |Cite
|
Sign up to set email alerts
|

Secure Device Association

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…The main goal of the research community working on the secure device pairing issue has been to provide mechanisms that give assurance of the identity of the devices participating in the pairing process and to secure them from being victims of eavesdropping attacks, such as MiTM attack. Achieving this goal is a challenging problem from both the security and the usability points of view [32][33]. Consequently, Malkani et.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The main goal of the research community working on the secure device pairing issue has been to provide mechanisms that give assurance of the identity of the devices participating in the pairing process and to secure them from being victims of eavesdropping attacks, such as MiTM attack. Achieving this goal is a challenging problem from both the security and the usability points of view [32][33]. Consequently, Malkani et.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed system integrates device discovery, several pairing schemes and a protocol selection mechanism into a single model that facilitates association of any pair of devices in a wide range of scenarios by using the devices' existing capabilities and user preferences, and also assists the user to select an appropriate pairing protocol and relieves him/her from choosing between more than two dozen of pairing schemes. The interested readers can find the detailed analysis of these existing schemes in [32][33] and the detailed system architecture of the proposed system in [1]. The focus of this paper is the usability study of eight pairing schemes as well as the proposed system, which integrates them.…”
Section: Introductionmentioning
confidence: 99%
“…Previously we have presented a detailed survey of the state-of-theart in secure device pairing [1]. Each of the proposed schemes we have surveyed has strengths and weaknesses often in hardware requirements, strength against various attacks or usability in particular scenarios.…”
Section: Need For Framework-based Approach To Device Pairingmentioning
confidence: 99%
“…For a detailed survey of pairing schemes, refer [1]. We are presenting the overview of the overall system as below:…”
Section: System Designmentioning
confidence: 99%
See 1 more Smart Citation