Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Mobile World of Security - The Model
KTH, School of Electrical Engineering (EES), Communication Networks.ORCID iD: 0000-0002-3267-5374
2011 (English)In: IEEE Information Theory Society Conference on Information Sciences and Systems (CISS), IEEE , 2011, 1-6 p.Conference paper, Published paper (Refereed)
Abstract [en]

We propose a novel approach to establish cryptographic keys among mobile users and a networking infrastructure. Our approach comes at a low cost and can either be used as an alternative to existing solutions or can be employed in a complementary way. Our basic observation is that users are often very mobile. As they interact with the infrastructure, each of them leaves a unique trace behind, known both to the users and the infrastructure. We can leverage this shared information to create shared secret keys, with little or no change of existing mobile communication systems. We show that we can achieve (almost passively) a rate of roughly 0.1 bits per second.

Place, publisher, year, edition, pages
IEEE , 2011. 1-6 p.
Keyword [en]
Analytical models, Base stations, Computational modeling, Entropy, Mobile communication, Protocols, Wireless communication
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-35541DOI: 10.1109/CISS.2011.5766242Scopus ID: 2-s2.0-79957866256OAI: oai:DiVA.org:kth-35541DiVA: diva2:429046
Conference
45th Annual Conference on Information Sciences and Systems (CISS), 2011
Funder
ICT - The Next Generation
Note
© 2011 IEEE. Personal use of the attached pdf is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. QC 20120220Available from: 2011-07-08 Created: 2011-07-01 Last updated: 2012-06-13Bibliographically approved

Open Access in DiVA

fulltext(208 kB)152 downloads
File information
File name FULLTEXT01.pdfFile size 208 kBChecksum SHA-512
2d0738c80374ec07d1b0fea1748f64bf3e87023412df68d58e3e0fd4c3b3fabddd52dd3cebc1f477f57f42dc3a64bf8c96ccf20cda5bb5bfa5d24fa39d7c113d
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusIEEEXplore

Search in DiVA

By author/editor
Papadimitratos, Panagiotis
By organisation
Communication Networks
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 152 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 66 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf