On the Usability of Secure Association of Wireless Devices Based on Distance Bounding

Download Now Free registration required

Executive Summary

When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and confidential, in order to mitigate any malicious control of or eavesdropping over the communication. When there is no prior security context, such as, shared secrets, common key servers or public key certificates, device association necessitates some level of user involvement into the process. A wide variety of user-aided security association techniques have been proposed in the past.

  • Format: PDF
  • Size: 448.8 KB