http://www.cnr.it/ontology/cnr/individuo/prodotto/ID44386
AmbiSec: securing smart spaces using entropy harvesting (Contributo in atti di convegno)
- Type
- Label
- AmbiSec: securing smart spaces using entropy harvesting (Contributo in atti di convegno) (literal)
- Anno
- 2010-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1007/978-3-642-16917-5_8 (literal)
- Alternative label
Barsocchi P., Chessa S., Martinovic I., Oligeri G. (2010)
AmbiSec: securing smart spaces using entropy harvesting
in Aml 2010 - Ambient Intelligence. First International Joint Conference, Malaga, Spain, 10-12 november 2010
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- Barsocchi P., Chessa S., Martinovic I., Oligeri G. (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://www.springerlink.com/content/8135060321j40rp3/ (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#volumeInCollana
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- In: Aml 2010 - Ambient Intelligence. First International Joint Conference (Malaga, Spain, 10-12 november 2010). Proceedings, pp. 73 - 85. Boris de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Mana Gomez (eds.). (Lecture Notes in Computer Science, vol. 6439). Springer, 2010. (literal)
- Note
- Scopu (literal)
- PuMa (literal)
- ISI Web of Science (WOS) (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- CNR-ISTI, Pisa, iTALY; Department of Computer Science, University of Pisa, iTALY; Computer Science Department, University of Kaiserslautern, Germany; cnr-isti, pISA, iTALY (literal)
- Titolo
- AmbiSec: securing smart spaces using entropy harvesting (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- 978-3-642-16916-8 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#curatoriVolume
- Boris de Ruyter, Reiner Wichert, David V. Keyson, Panos Markopoulos, Norbert Streitz, Monica Divitini, Nikolaos Georgantas, Antonio Mana Gomez (literal)
- Abstract
- Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication. (literal)
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Insieme di parole chiave di