http://www.cnr.it/ontology/cnr/individuo/prodotto/ID315634
SHAKE: Single HAsh Key Establishment for resource constrained devices (Articolo in rivista)
- Type
- Label
- SHAKE: Single HAsh Key Establishment for resource constrained devices (Articolo in rivista) (literal)
- Anno
- 2013-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1016/j.adhoc.2012.05.013 (literal)
- Alternative label
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Barsocchi P., Oligeri G., Soriente C. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
- [Online First 08 June 2012] - Tipo Progetto EU_FP7
- UNIVERsal open platform and reference Specification for Ambient Assisted Living
Acronimo UNIVERSAAL
Grant agreement 247950 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://www.sciencedirect.com/science/article/pii/S1570870512001084 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
- Rivista
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
- Note
- PuMa (literal)
- ISI Web of Science (WOS) (literal)
- Scopu (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-ISTI, Pisa, Italy; University of Trento, Italy; Institute for Information Security, ETH Zurich, Switzerland (literal)
- Titolo
- SHAKE: Single HAsh Key Establishment for resource constrained devices (literal)
- Abstract
- Pairwise secret key establishment leveraging properties of the wireless channel, is an effective security means in scenarios where no common secret or PKI is available. Related work has shown that secret bit streams can be extracted from, e.g., signal strength ratio measurement between two peers. However, they all require a considerable amount of computing resources by the two parties. In this paper we present SHAKE, a novel algorithm to establish a key using the physical properties of the wireless channel.SHAKE is particularly suitable for scenarios where the two peers have very diverse computational resources. For example, SHAKE can be used to establish a key between a sensor and the sink in a Wireless Sensor Network. We show that a secret key can be established shifting the computational burden on one peer while the other party only require one hash evaluation, what can be afforded by any resource constrained device. We evaluate SHAKE through theoretical analysis and provide validation through real world measurements. According to our experiments, the proposed protocol generates high-entropy bit at remarkable rates and enjoys minimal computational complexity requirements at one of the two parties. (literal)
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
- Insieme di parole chiave di