Mobility

A Mobile World of Security - The Model

Free registration required

Executive Summary

The authors propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Their approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Their basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known both to the users and the infrastructure. They can leverage this shared information to create shared secret keys, with little or no change of existing mobile communication systems. They show that they can achieve (almost passively) a rate of roughly 0:1 bits per second.

  • Format: PDF
  • Size: 207.93 KB