[ietf-enroll] More imprinting papers

Pasi.Eronen@nokia.com Pasi.Eronen at nokia.com
Thu Mar 10 12:58:17 EST 2005


Hi,

During the WG meeting, I promised to send pointers to a couple of
papers that may be related to the WG scope. (This was related to
something I did about two years ago, so there's probably more 
recent work that I'm not aware of.)

These papers are more about "imprinting" part, where you have some
kind of relatively "weak" out-of-band channel (like physical contact,
US mail, or whatever) that you use to "enroll" something stronger; 
as opposed to using one reasonably strong authentication system to
distribute keys for something else (like "bootstrapping" key for 
Mobile IP from EAP).

(But of course it's sometimes fuzzy what exactly is "out-of-band"
and what is "strong".)

Best regards,
Pasi

--------------------

Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong: 
Talking To Strangers: Authentication in Ad-Hoc Wireless Networks.  
In Network and Distributed System Security Symposium Conference 
Proceedings: 2002 (NDSS 2002).
http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/balfan.pdf

Dirk Balfanz et al.:
Network in Under a Minute. 
Proceedings of the 13th USENIX Security Symposium, August 2004.
http://www.grinter.org/usenix.pdf

Tim Kindberg and Kan Zhang:
Context authentication using constrained channels.
In proceedings of 4th IEEE Workshop on Mobile Computing Systems & 
Applications (WMCSA 2002). Also HP Labs technical report HPL-2001-84. 
http://www.hpl.hp.com/techreports/2001/HPL-2001-84.html

Tim Kindberg, Kan Zhang:
Validating and Securing Spontaneous Associations between Wireless Devices.
HP Labs technical report HPL-2002-256, September 2002.
http://hpl.hp.com/techreports/2002/HPL-2002-256.html

John Barton, Tim Kindberg and Shreyas Sadalgi.
Physical Registration: Configuring Electronic Directories using 
Handheld Devices. 
IEEE Wireless Communications magazine, Feb. 2002, pp. 30-38. 
Also HP Labs technical report HPL-2001-119.
http://www.hpl.hp.com/techreports/2001/HPL-2001-119.html

Sampo Sovio (editor): 
Final technical report - Specification of a security architecture 
for distributed terminals (Section 5). 
IST-SHAMAN Deliverable D13 Annex 2, November 2002.
http://www.isrc.rhul.ac.uk/shaman/docs/d13a2v1.pdf

Frank Stajano and Ross J. Anderson.  
The resurrecting duckling: Security issues for ad-hoc wireless networks.  
In 7th Security Protocols Workshop, volume 1796 of LNCS, 
Springer-Verlag, 1999.
http://www-lce.eng.cam.ac.uk/~fms27/papers/duckling.pdf

Frank Stajano.  
The resurrecting duckling - what next?  
In Security Protocols-8th International Workshop, Lecture Notes 
in Computer Science vol. 2133, Springer-Verlag, 2000.
http://www-lce.eng.cam.ac.uk/~fms27/papers/duckling-what-next.pdf

Frank Stajano and Ross Anderson.
The Resurrecting Duckling: Security Issues for Ubiquitous Computing
In IEEE Computer (Security & Privacy supplement), April 2002.
http://www.computer.org/security/supplement1/sta/

Joseph Davies/Microsoft Corp:
The New Wireless Network Setup Wizard in Windows XP Service Pack 2.
The Cable Guy, June 2004
http://www.microsoft.com/technet/community/columns/cableguy/cg0604.mspx

Narendar Shankar and Dirk Balfanz:
Enabling Secure Ad-hoc Communication using Context-Aware Security 
Services (Extended Abstract) 
Workshop on Security in Ubiquitous Computing, 4th International 
UBICOMP, 2002
http://www.teco.edu/~philip/ubicomp2002ws/organize/palo.pdf

N. Asokan and Philip Ginzboorg: 
Key Agreement in Ad-hoc Networks.
Computer Communications vol 23, no 17, November 2000.
http://www.semper.org/sirene/people/asokan/research/ccr.ps.gz

Lars Erik Holmquist, F. Mattern, Bernt Schiele, Petteri Alahuhta, 
Michael Beigl, Hans-W. Gellersen:
Smart-Its Friends: A Technique for Users to Easily Establish 
Connections between Smart Artefacts.
Proc. Ubicomp 2001, Springer-Verlag LNCS 2201, pp. 116-122, 2001
http://www.teco.edu/~michael/publication/smart-its.friends.pdf

--------------------



More information about the ietf-enroll mailing list