Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/WMCSA.2006.9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Exploiting Mobility for Key Establishment

Published: 06 April 2006 Publication History

Abstract

Despite years of research on security and cryptography, the vast majority of Internet communications are still unencrypted. We argue the blame lies not with users but with the tools they have available to them. Securing a communication channel with encryption is easy - the hard part is distributing keys in the first place. Current solutions rely ultimately on user actions - verification of encryption keys by inspecting either fingerprints or certificates. Instead, we present a model in which keys are established insecurely and automatically confirmed by exchanging cryptographic hashes of the key. To thwart an active attacker, hashes must travel over some path the attacker does not control. To do so, we exploit users' everyday mobility, plus the capabilities of an overlay network, to resend hashes from diverse access points. Initial simulation and field results support our claim that this generates routes sufficiently diverse to foil all but the most powerful attackers, without requiring explicit action on the part of users.

Cited By

View all
  • (2006)Improved access point selectionProceedings of the 4th international conference on Mobile systems, applications and services10.1145/1134680.1134705(233-245)Online publication date: 19-Jun-2006
  • (2006)LoKeyProceedings of the 4th international conference on Pervasive Computing10.1007/11748625_13(202-219)Online publication date: 7-May-2006

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
WMCSA '06: Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications
April 2006
86 pages
ISBN:0769524397

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 April 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2006)Improved access point selectionProceedings of the 4th international conference on Mobile systems, applications and services10.1145/1134680.1134705(233-245)Online publication date: 19-Jun-2006
  • (2006)LoKeyProceedings of the 4th international conference on Pervasive Computing10.1007/11748625_13(202-219)Online publication date: 7-May-2006

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media