AmbiSec: securing smart spaces using entropy harvesting (Contributo in atti di convegno)

Type
Label
  • AmbiSec: securing smart spaces using entropy harvesting (Contributo in atti di convegno) (literal)
Anno
  • 2010-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/978-3-642-16917-5_8 (literal)
Alternative label
  • Barsocchi P., Chessa S., Martinovic I., Oligeri G. (2010)
    AmbiSec: securing smart spaces using entropy harvesting
    in Aml 2010 - Ambient Intelligence. First International Joint Conference, Malaga, Spain, 10-12 november 2010
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Barsocchi P., Chessa S., Martinovic I., Oligeri G. (literal)
Pagina inizio
  • 73 (literal)
Pagina fine
  • 85 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.springerlink.com/content/8135060321j40rp3/ (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
  • 6439 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • In: Aml 2010 - Ambient Intelligence. First International Joint Conference (Malaga, Spain, 10-12 november 2010). Proceedings, pp. 73 - 85. Boris de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Mana Gomez (eds.). (Lecture Notes in Computer Science, vol. 6439). Springer, 2010. (literal)
Note
  • Scopu (literal)
  • PuMa (literal)
  • ISI Web of Science (WOS) (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • CNR-ISTI, Pisa, iTALY; Department of Computer Science, University of Pisa, iTALY; Computer Science Department, University of Kaiserslautern, Germany; cnr-isti, pISA, iTALY (literal)
Titolo
  • AmbiSec: securing smart spaces using entropy harvesting (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 978-3-642-16916-8 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
  • Boris de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Mana Gomez (literal)
Abstract
  • Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication. (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Insieme di parole chiave di
data.CNR.it