[ietf-enroll] More imprinting papers
Pasi.Eronen@nokia.com
Pasi.Eronen at nokia.com
Thu Mar 10 12:58:17 EST 2005
Hi,
During the WG meeting, I promised to send pointers to a couple of
papers that may be related to the WG scope. (This was related to
something I did about two years ago, so there's probably more
recent work that I'm not aware of.)
These papers are more about "imprinting" part, where you have some
kind of relatively "weak" out-of-band channel (like physical contact,
US mail, or whatever) that you use to "enroll" something stronger;
as opposed to using one reasonably strong authentication system to
distribute keys for something else (like "bootstrapping" key for
Mobile IP from EAP).
(But of course it's sometimes fuzzy what exactly is "out-of-band"
and what is "strong".)
Best regards,
Pasi
--------------------
Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong:
Talking To Strangers: Authentication in Ad-Hoc Wireless Networks.
In Network and Distributed System Security Symposium Conference
Proceedings: 2002 (NDSS 2002).
http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/balfan.pdf
Dirk Balfanz et al.:
Network in Under a Minute.
Proceedings of the 13th USENIX Security Symposium, August 2004.
http://www.grinter.org/usenix.pdf
Tim Kindberg and Kan Zhang:
Context authentication using constrained channels.
In proceedings of 4th IEEE Workshop on Mobile Computing Systems &
Applications (WMCSA 2002). Also HP Labs technical report HPL-2001-84.
http://www.hpl.hp.com/techreports/2001/HPL-2001-84.html
Tim Kindberg, Kan Zhang:
Validating and Securing Spontaneous Associations between Wireless Devices.
HP Labs technical report HPL-2002-256, September 2002.
http://hpl.hp.com/techreports/2002/HPL-2002-256.html
John Barton, Tim Kindberg and Shreyas Sadalgi.
Physical Registration: Configuring Electronic Directories using
Handheld Devices.
IEEE Wireless Communications magazine, Feb. 2002, pp. 30-38.
Also HP Labs technical report HPL-2001-119.
http://www.hpl.hp.com/techreports/2001/HPL-2001-119.html
Sampo Sovio (editor):
Final technical report - Specification of a security architecture
for distributed terminals (Section 5).
IST-SHAMAN Deliverable D13 Annex 2, November 2002.
http://www.isrc.rhul.ac.uk/shaman/docs/d13a2v1.pdf
Frank Stajano and Ross J. Anderson.
The resurrecting duckling: Security issues for ad-hoc wireless networks.
In 7th Security Protocols Workshop, volume 1796 of LNCS,
Springer-Verlag, 1999.
http://www-lce.eng.cam.ac.uk/~fms27/papers/duckling.pdf
Frank Stajano.
The resurrecting duckling - what next?
In Security Protocols-8th International Workshop, Lecture Notes
in Computer Science vol. 2133, Springer-Verlag, 2000.
http://www-lce.eng.cam.ac.uk/~fms27/papers/duckling-what-next.pdf
Frank Stajano and Ross Anderson.
The Resurrecting Duckling: Security Issues for Ubiquitous Computing
In IEEE Computer (Security & Privacy supplement), April 2002.
http://www.computer.org/security/supplement1/sta/
Joseph Davies/Microsoft Corp:
The New Wireless Network Setup Wizard in Windows XP Service Pack 2.
The Cable Guy, June 2004
http://www.microsoft.com/technet/community/columns/cableguy/cg0604.mspx
Narendar Shankar and Dirk Balfanz:
Enabling Secure Ad-hoc Communication using Context-Aware Security
Services (Extended Abstract)
Workshop on Security in Ubiquitous Computing, 4th International
UBICOMP, 2002
http://www.teco.edu/~philip/ubicomp2002ws/organize/palo.pdf
N. Asokan and Philip Ginzboorg:
Key Agreement in Ad-hoc Networks.
Computer Communications vol 23, no 17, November 2000.
http://www.semper.org/sirene/people/asokan/research/ccr.ps.gz
Lars Erik Holmquist, F. Mattern, Bernt Schiele, Petteri Alahuhta,
Michael Beigl, Hans-W. Gellersen:
Smart-Its Friends: A Technique for Users to Easily Establish
Connections between Smart Artefacts.
Proc. Ubicomp 2001, Springer-Verlag LNCS 2201, pp. 116-122, 2001
http://www.teco.edu/~michael/publication/smart-its.friends.pdf
--------------------
More information about the ietf-enroll
mailing list