Abstract
We present a set of simple techniques for key
establishment over a radio link in peer-to-peer networks. Our
approach is based on the Diffie-Hellman key agreement protocol,
which is known to be vulnerable to the “man-in-the-middle”
attack if the two users involved in the protocol do not share any
authenticated information about each other (e.g., public keys,
certificates, passwords, shared keys, etc.) prior to the protocol
execution. In this paper, we solve the problem by leveraging on
the natural ability of users to authenticate each other by visual
and verbal contact.We propose three techniques: the first is based
on visual comparison of short strings, the second on distance
bounding, and the third on integrity codes; in each case, the
users do not need to enter any password or other data, nor do
they need physical or infrared connectivity between their devices.
We base our analysis on a well-established methodology that leads
us to a rigorous modularization and a thorough robustness proof
of our proposal.
Original language | English |
---|---|
Journal | Proceedings of the IEEE |
Volume | 94 |
Issue number | 2 |
Pages (from-to) | 467-478 |
ISSN | 0018-9219 |
DOIs | |
Publication status | Published - 2006 |
Keywords
- insecure channels
- Key agreement
- DH